Exploring Effects of Electromagnetic Fault Injection on a 32-bit High Speed Embedded Device Microprocessor

Researchers already presented electromagnetic fault injection as an attack technique to change data and instruction execution in an electronic device. For a successful and reliable attack an attacker has to find a usable injections configuration. Therefore an attacker has to explore a range of available configuration parameters. To the best of our knowledge no summary and evaluation of glitch effect exploration techniques has been published yet. Furthermore no work has performed electromagnetic fault injection on a 32-bit target running with clock speeds above 500 Mhz. The aim of this thesis is to list and test these glitch effect exploration techniques on a 32-bit high speed embedded device microprocessor.

[1]  Amine Dehbaoui,et al.  Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system- , 2012, IACR Cryptol. ePrint Arch..

[2]  Alessandro Barenghi,et al.  Low Voltage Fault Attacks on the RSA Cryptosystem , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).

[3]  Jasper G. J. van Woudenberg,et al.  Practical Optical Fault Injection on Secure Microcontrollers , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[4]  Assia Tria,et al.  Adjusting Laser Injections for Fully Controlled Faults , 2014, COSADE.

[5]  Amine Dehbaoui,et al.  Electromagnetic Transient Faults Injection on a Hardware and a Software Implementations of AES , 2012, 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[6]  Karine Heydemann,et al.  Electromagnetic Fault Injection: Towards a Fault Model on a 32-bit Microcontroller , 2013, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[7]  Albert Spruyt Building fault models for microcontrollers , 2012 .

[8]  Amine Dehbaoui,et al.  Electromagnetic Glitch on the AES Round Counter , 2013, COSADE.

[9]  Richard J. Lipton,et al.  On the Importance of Eliminating Errors in Cryptographic Computations , 2015, Journal of Cryptology.

[10]  Andrew W. Appel,et al.  Using memory errors to attack a virtual machine , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  J. Karlsson,et al.  Application of Three Physical Fault Injection Techniques to the Experimental Assessment of the MARS Architecture , 1995 .

[12]  Map Aarts,et al.  Electromagnetic fault injection using transient pulse injections:a comparison of EM-FI and optical-FI on smart cards , 2013 .

[13]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[14]  Rajesh Velegalati,et al.  Electro Magnetic Fault Injection in Practice , 2013 .

[15]  Philippe Maurine,et al.  Yet Another Fault Injection Technique : by Forward Body Biasing Injection , 2012 .

[16]  Jörn-Marc Schmidt,et al.  A Practical Fault Attack on Square and Multiply , 2008, 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography.

[17]  Ingrid Verbauwhede,et al.  The Fault Attack Jungle - A Classification Model to Guide You , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.