Acceleration of fault attack emulation by consideration of fault propagation

In recent years the number of deployed embedded systems increased significantly. These system-on-chips are widely used for high-availability as well as security applications. Therefore, the reliable operation of these devices plays a vital role and disturbed operation can lead to loss of confidence and trust. To ensure correct operation during random or intentional fault events, injection techniques for system simulation and emulation have been presented. The targeted use of these approaches is often difficult because of the device complexity and the lack of knowledge about internal processes after a fault has been activated. To improve the current state-of-the-art in this field this paper presents fault propagation analysis and hardware checker generation techniques based on static VHDL code analysis. These help to gain a deeper understanding of system internal propagation paths and their influence on normal operation. Physical layout data is included to enable the mapping of a fault attack location to its corresponding logic gates. Hardware checkers enable higher fault injection evaluation efficiency by removing masked system parts from the target space.

[1]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[2]  R. Leveugle Early Analysis of Fault-based Attack Effects in Secure Circuits , 2007, IEEE Transactions on Computers.

[3]  David Naccache,et al.  The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.

[4]  Heinrich Theodor Vierhaus,et al.  Simulated fault injections and their acceleration in SystemC , 2008, Microprocess. Microsystems.

[5]  Johan Karlsson,et al.  Fault injection into VHDL models: the MEFISTO tool , 1994 .

[6]  Sara Blanc,et al.  Enhancement of Fault Injection Techniques Based on the Modification of VHDL Code , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[7]  Markus Pister,et al.  A Framework for Static Analysis of VHDL Code , 2007, WCET.

[8]  Simon W. Moore,et al.  Security evaluation at design time against optical fault injection attacks , 2006 .

[9]  Christian Steger,et al.  Modular Fault Injector for Multiple Fault Dependability and Security Evaluations , 2011, 2011 14th Euromicro Conference on Digital System Design.

[10]  David de Andrés,et al.  Fault Emulation for Dependability Evaluation of VLSI Systems , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[11]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[12]  Christian Steger,et al.  Characterization and handling of low-cost micro-architectural signatures in MPSoCs , 2012, 2012 17th IEEE European Test Symposium (ETS).

[13]  Frederic T. Chong,et al.  Secure information flow analysis for hardware design: using the right abstraction for the job , 2010, PLAS '10.

[14]  Diana Marculescu,et al.  Modeling and Optimization for Soft-Error Reliability of Sequential Circuits , 2008, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[15]  Diana Marculescu,et al.  Multiple Transient Faults in Combinational and Sequential Circuits: A Systematic Approach , 2010, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[16]  John P. Hayes,et al.  Signature-Based SER Analysis and Design of Logic Circuits , 2009, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[17]  Markus Pister,et al.  An abstraction-aware compiler for VHDL models , 2009, 2009 International Conference on Computer Engineering & Systems.

[18]  Sergei Skorobogatov,et al.  Semi-invasive attacks: a new approach to hardware security analysis , 2005 .

[19]  Markus Pister,et al.  Semi-automatic derivation of timing models for WCET analysis , 2010, LCTES '10.

[20]  Christian Steger,et al.  High level fault injection for attack simulation in smart cards , 2004, 13th Asian Test Symposium.