A Fast Characterization Method for Semi-invasive Fault Injection Attacks

Semi-invasive fault injection attacks are powerful techniques well-known by attackers and secure embedded system designers. When performing such attacks, the selection of the fault injection parameters is of utmost importance and usually based on the experience of the attacker. Surprisingly, there exists no formal and general approach to characterize the target behavior under attack. In this work, we present a novel methodology to perform a fast characterization of the fault injection impact on a target, depending on the possible attack parameters. We experimentally show our methodology to be a successful one when targeting different algorithms such as DES and AES encryption and then extend to the full characterization with the help of deep learning. Finally, we show how the characterization results are transferable between different targets.

[1]  A. Johnston Charge generation and collection in p-n junctions excited with pulsed infrared lasers , 1993 .

[2]  Jean-Max Dutertre,et al.  Body Biasing Injection Attacks in Practice , 2016, CS2@HiPEAC.

[3]  Alan Hanjalic,et al.  Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis , 2019, IACR Cryptol. ePrint Arch..

[4]  Georg Sigl,et al.  Semi-invasive EM attack on FPGA RO PUFs and countermeasures , 2011 .

[5]  Patrick van der Smagt,et al.  Introduction to neural networks , 1995, The Lancet.

[6]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[7]  Ilia Polian,et al.  Precise fault-injections using voltage and temperature manipulation for differential cryptanalysis , 2014, 2014 IEEE 20th International On-Line Testing Symposium (IOLTS).

[8]  Giorgio Di Natale,et al.  Laser-induced fault effects in security-dedicated circuits , 2014, 2014 22nd International Conference on Very Large Scale Integration (VLSI-SoC).

[9]  Henk C. A. van Tilborg,et al.  Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .

[10]  Jasper G. J. van Woudenberg,et al.  Practical Optical Fault Injection on Secure Microcontrollers , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[11]  Fabrizio De Santis,et al.  Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks - How Low Can We Go? , 2017, COSADE.

[12]  Samy Bengio,et al.  Links between perceptrons, MLPs and SVMs , 2004, ICML.

[13]  Richard J. Lipton,et al.  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.

[14]  Lejla Batina,et al.  Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection , 2013, CARDIS.

[15]  Alexander LeNail,et al.  NN-SVG: Publication-Ready Neural Network Architecture Schematics , 2019, J. Open Source Softw..

[16]  Sylvain Guilley,et al.  Side-channel analysis and machine learning: A practical perspective , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[17]  Assia Tria,et al.  Invasive Attacks , 2005, Encyclopedia of Cryptography and Security.

[18]  Cécile Canovas,et al.  Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.

[19]  Sergei Skorobogatov,et al.  Optical Fault Masking Attacks , 2010, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[20]  Lejla Batina,et al.  Evolving genetic algorithms for fault injection attacks , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[21]  Dengguo Feng,et al.  Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..

[22]  Christophe Giraud,et al.  DFA on AES , 2004, AES Conference.

[23]  Ross J. Anderson,et al.  Optical Fault Induction Attacks , 2002, CHES.

[24]  Eli Biham,et al.  Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.

[25]  Lejla Batina,et al.  Fault Injection with a New Flavor: Memetic Algorithms Make a Difference , 2015, COSADE.

[26]  Lejla Batina,et al.  Genetic Algorithm-Based Electromagnetic Fault Injection , 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).

[27]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[28]  Annelie Heuser,et al.  The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..