2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) 2009
DOI: 10.1109/fdtc.2009.37
|View full text |Cite
|
Sign up to set email alerts
|

Optical Fault Attacks on AES: A Threat in Violet

Abstract: Microprocessors are the heart of the devices we rely on every day. However, their non-volatile memory, which often contains sensitive information, can be manipulated by ultraviolet (UV) irradiation. This paper gives practical results demonstrating that the non-volatile memory can be erased with UV light by investigating the effects of UV-C light with a wavelength of 254 nm on four different depackaged microcontrollers.We demonstrate that an adversary can use this effect to attack an AES software implementation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
29
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(30 citation statements)
references
References 11 publications
1
29
0
Order By: Relevance
“…While Flash technology is considered secured, emerging NVM integrity has not been investigated neither under UV nor laser attacks such as in [1] or [2]. This is the reason why this work is leaning on one of this technologies security issues, which is oxide-based RRAM (OxRAM).…”
Section: A Non-volatile Memories Issuesmentioning
confidence: 99%
“…While Flash technology is considered secured, emerging NVM integrity has not been investigated neither under UV nor laser attacks such as in [1] or [2]. This is the reason why this work is leaning on one of this technologies security issues, which is oxide-based RRAM (OxRAM).…”
Section: A Non-volatile Memories Issuesmentioning
confidence: 99%
“…For example, in [10] the authors were able to mount a successful attack by causing temporary brown outs and glitches on the supply line of an 8-bit microcontroller. In [19], Schmidt et al attacked an implementation of AES by blanking selectively the memory where the SBoxes are held. In [16], Peacham et al describe a successful attack mounted, using laser induced fault injection, on an AES implementation in a commercial grade smart card, that did not include any countermeasures against fault attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The strong radiation directed at the silicon surface can cause the blanking of erasable EPROM and FLASH memory cells where constants needed for an algorithm execution are kept (e.g., the AES S-Boxes). Depending on the duration of the radiation process, the authors of [34] report a progressive blanking of all the memory cells as well as resetting the internal protection fuses of the microcontroller that was targeted. The authors also show that it is possible to selectively wipe out a part of the stored data in the memory by exposing only a part of the die to UV radiation.…”
Section: A Low Cost Fault Injection Techniquesmentioning
confidence: 99%