2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2019
DOI: 10.1109/hst.2019.8741030
|View full text |Cite
|
Sign up to set email alerts
|

Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller

Abstract: Physical attacks are a known threat posed against secure embedded systems. Notable among these is laser fault injection, which is often considered as the most effective fault injection technique. Indeed, laser fault injection provides a high spatial accuracy, which enables an attacker to induce bit-level faults. However, experience gained from attacking 8-bit targets might not be relevant on more advanced micro-architectures, and these attacks become increasingly challenging on 32-bit microcontrollers. In this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
39
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 39 publications
(43 citation statements)
references
References 30 publications
4
39
0
Order By: Relevance
“…• The fault analysis will miss potential implementation weaknesses. Recent target specific fault models [4], [5], [6], bypass software countermeasures in a single fault. • This challenge becomes even more crucial for multifault attacks analysis as there will be more unnoticed vulnerabilities as well as more unexploitable attacks because of the combinatorial explosion of possible attack paths.…”
Section: Challenges Of Multi-fault Attack Vulnerability Assessmentmentioning
confidence: 99%
“…• The fault analysis will miss potential implementation weaknesses. Recent target specific fault models [4], [5], [6], bypass software countermeasures in a single fault. • This challenge becomes even more crucial for multifault attacks analysis as there will be more unnoticed vulnerabilities as well as more unexploitable attacks because of the combinatorial explosion of possible attack paths.…”
Section: Challenges Of Multi-fault Attack Vulnerability Assessmentmentioning
confidence: 99%
“…Instruction modification achieves an instruction skip if the modified instruction has no effect on the code operations (instruction skips are often actual code modification); the same is true for turning an instruction into a nop. An analysis of single instruction skips due to instruction modification induced by laser is reported in [8]. It relates how faulting one bit of an instruction opcode led to two successful fas.…”
Section: Study Of Laser-induced Instruction Skipsmentioning
confidence: 99%
“…Laser-induced fault injection may be used to force the identification of an attacker using a wrong PIN. As illustrated in [8], where a laser-induced modification of one instruction of a similar PIN algorithm permits to perform a PIN bypass. [9] describes, on simulation basis, several instruction skip attacks that may result in a successful PIN bypass: most of them targeting one or a few successive code instructions.…”
Section: Pin Bypass With Several Laser Pulsesmentioning
confidence: 99%
See 2 more Smart Citations