2020 IEEE International Symposium on Circuits and Systems (ISCAS) 2020
DOI: 10.1109/iscas45731.2020.9180708
|View full text |Cite
|
Sign up to set email alerts
|

RNN-Based Detection of Fault Attacks on RSA

Abstract: Physical fault injection attacks are becoming an important threat to computer systems, as fault injection equipment becomes more and more accessible. In this work, we propose a new strategy to detect fault attacks in cryptosystems. We use a recurrent neural network (RNN) to detect problems in the program flow caused by injected faults. Our neural network is trained using the instructions of non-faulty operations and therefore, it can protect against both current and future attacks. As a case study, we use two … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 24 publications
(26 reference statements)
0
7
0
Order By: Relevance
“…Many fault attacks on instructions can be used to exploit these vulnerabilities. To evaluate the strength of the detection and correction scheme, we use the following fault attack models [19]: bit-level, byte-level, branch-to-opposite, and instruction-to-instruction I/II fault models.…”
Section: B Application and Threat Modelmentioning
confidence: 99%
“…Many fault attacks on instructions can be used to exploit these vulnerabilities. To evaluate the strength of the detection and correction scheme, we use the following fault attack models [19]: bit-level, byte-level, branch-to-opposite, and instruction-to-instruction I/II fault models.…”
Section: B Application and Threat Modelmentioning
confidence: 99%
“…The first group of countermeasures uses redundancy mechanisms to validate a fault-free operation. These mechanisms can be added in time (e.g., algorithm-wise [5], instructionwise [6], and via delay mechanisms [7]) or in space (i.e., extra hardware [8]) [9]. However, these mechanisms result in a high-performance penalty or overhead, which limit their application to the IoT devices with strict resource budgets.…”
Section: Introductionmentioning
confidence: 99%
“…Today, this is especially of concern due to the prominence of fault attacks. Although classical fault injection techniques like underfeeding, heating, or shooting EM waves and lasers [8] might not represent a huge threat due to their physical proximity requirements, logical approaches are still possible. Moreover, it also important to protect against faults caused by radiation [9].…”
Section: Introductionmentioning
confidence: 99%