Experimental Evaluation of Protections Against Laser-induced Faults and Consequences on Fault Modeling

Lasers can be used by hackers to situations to inject faults in circuits and induce security flaws. On-line detection mechanisms are classically proposed to counter such attacks, and are often based on error detecting codes. However, the efficiency of such schemes has not been precisely validated against real attack conditions. This paper presents results showing that, with a given type of laser, a classical protection technique can leave open doors to an attacker. The results give also insights into the fault models to be taken into account when designing a secured circuit.

[1]  David Naccache,et al.  The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.

[2]  Fabrice Monteiro,et al.  Characterizing laser-induced pulses in ICs: methodology and results , 2006, 12th IEEE International On-Line Testing Symposium (IOLTS'06).

[3]  Christophe Giraud,et al.  An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.

[4]  Régis Leveugle,et al.  Practical evaluation of fault countermeasures on asynchronous DES crypto processor , 2006, 12th IEEE International On-Line Testing Symposium (IOLTS'06).

[5]  Arjen K. Lenstra Memo on RSA signature generation in the presence of faults , 1996 .

[6]  Israel Koren,et al.  Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard , 2003, IEEE Trans. Computers.

[7]  Hervé Lapuyade,et al.  An overview of the applications of a pulsed laser system for SEU testing , 2000, Proceedings 6th IEEE International On-Line Testing Workshop (Cat. No.PR00646).

[8]  R. Leveugle,et al.  A Highly Flexible Hardened RTL Processor Core Based on LEON2 , 2006, IEEE Transactions on Nuclear Science.