2010 Workshop on Fault Diagnosis and Tolerance in Cryptography 2010
DOI: 10.1109/fdtc.2010.15
|View full text |Cite
|
Sign up to set email alerts
|

Fault Injection Resilience

Abstract: Abstract-Fault injections constitute a major threat to the security of embedded systems. Errors occurring in the cryptographic algorithms have been shown to be extremely dangerous, since powerful attacks can exploit few of them to recover the full secrets. Most of the resistance techniques to perturbation attacks have relied so far on the detection of faults. We present in this paper another strategy, based on the resilience against fault attacks. The core idea is to allow an erroneous result to be outputted, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 58 publications
(74 reference statements)
0
19
0
Order By: Relevance
“…There are also some works using evolution and genetic algorithms [11]. Very powerful attacks are also active side-channel-attacks, namely Fault Injection Attacks (FIA) [12,13], and hardware trojan horses [14].…”
Section: Other Scasmentioning
confidence: 99%
“…There are also some works using evolution and genetic algorithms [11]. Very powerful attacks are also active side-channel-attacks, namely Fault Injection Attacks (FIA) [12,13], and hardware trojan horses [14].…”
Section: Other Scasmentioning
confidence: 99%
“…Also, hiding is a countermeasure against most fault injection attacks since the attacker erases the value stored redundantly in one pair of wires by changing only one of them. The case of symmetric faults is covered in [38] and of arbitrary faults in [39]. An interesting noting is that by associating masking and hiding, the protection extends to semi-invasive and invasive attacks.…”
Section: General Picturementioning
confidence: 99%
“…Typically, the bitstream decryption in Xilinx FPGAs is sent to the fabric (thus becoming non-functional), but the attacker cannot know which fault has been triggered (it remains internal to the FPGA). Also, if a mode of operation is used in way secure way (an initialization vector is refreshed each time), then it is difficult to observe both a correct and a faulty ciphertext; this is the root of the fault injection resilience countermeasure introduced in [14]. Now, secrets can be recovered from a circuit by various means:…”
Section: Threatsmentioning
confidence: 99%
“…Also, differential attacks (such as DFA [4]) require a correct and at least one [28] faulty cryptogram. This approach is similar to resilient countermeasures: the secret is made volatile [17], as well as the data [15]. We emphasize that for this class of countermeasure to be efficient, a tamper-resistant TRNG (True Random Number Generator) shall be available.…”
Section: Randomizing the Protocolsmentioning
confidence: 99%