Emulation-Based Fault Effect Analysis for Resource Constrained, Secure, and Dependable Systems

Testing hardware and software components regarding their fault detection and fault handling capabilities is of vital importance. However, considering the fact that security systems are built using several distributed hardware components (e.g., reader/smart card authentication system), testing each component individually is insufficient. Because novel system-wide multi-fault attack campaigns can be conducted, fault propagation as well as fault handling of the entire system must be regarded. State-of-the-art emulation-based fault analysis approaches neglect this system aspect as well as the fault impact on power dissipation and power supply. Here, we present a novel analysis methodology that characterizes the behavior of complete systems during the design phase, in terms of fault handling, power dissipation, and power supply. Emulation-based techniques are applied to provide cycle accurate analysis information of the system-under-test in real time. The presented approach is of importance when it comes to test resource constrained, dependable, and high secure system designs. We demonstrate the application of this approach by means of a reader/smart card authentication system. Furthermore, we show how system level-based multi-fault attacks can be emulated and how the resulting system behavior (e.g., power consumption, power supply, information leakage) can be exploited to extract security relevant information.

[1]  Mario García-Valderas,et al.  Soft Error Sensitivity Evaluation of Microprocessors by Multilevel Emulation-Based Fault Injection , 2012, IEEE Transactions on Computers.

[2]  Donatella Sciuto,et al.  Fault Models and Injection Strategies in SystemC Specifications , 2008, 2008 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools.

[3]  Christian Steger,et al.  Case study on multiple fault dependability and security evaluations , 2013, Microprocess. Microsystems.

[4]  R. Leveugle Early Analysis of Fault-based Attack Effects in Secure Circuits , 2007, IEEE Transactions on Computers.

[5]  Christian Steger,et al.  Emulation-Based Test and Verification of a Design's Functional, Performance, Power, and Supply Voltage Behavior , 2013, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.

[6]  Christian Steger,et al.  Automated Power Characterization for Run-Time Power Emulation of SoC Designs , 2010, 2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools.

[7]  J. N. Tombs,et al.  Noninvasive Fault Classification, Robustness and Recovery Time Measurement in Microprocessor-Type Architectures Subjected to Radiation-Induced Errors , 2009, IEEE Transactions on Instrumentation and Measurement.

[8]  Kevin Fu,et al.  Vulnerabilities in First-Generation RFID-Enabled Credit Cards , 2007, Financial Cryptography.

[9]  Christian Steger,et al.  System level power profile analysis and optimization for smart cards and mobile devices , 2008, SAC '08.

[10]  Régis Leveugle Fault injection in VHDL descriptions and emulation , 2000, Proceedings IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems.

[11]  Johan Karlsson,et al.  Fault injection into VHDL models: the MEFISTO tool , 1994 .

[12]  Jean Arlat,et al.  Fault Injection for Dependability Validation: A Methodology and Some Applications , 1990, IEEE Trans. Software Eng..

[13]  Daniel P. Siewiorek,et al.  Fault Injection Experiments Using FIAT , 1990, IEEE Trans. Computers.

[14]  L. Entrena,et al.  Advanced Simulation and Emulation Techniques for Fault Injection , 2007, 2007 IEEE International Symposium on Industrial Electronics.

[15]  Christian Steger,et al.  Estimation based power and supply voltage management for future RF-powered multi-core smart cards , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[16]  Jean-Marc Daveau,et al.  An industrial fault injection platform for soft-error dependability analysis and hardening of complex system-on-a-chip , 2009, 2009 IEEE International Reliability Physics Symposium.

[17]  Paul Kocher Complexity and the challenges of securing SoCs , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).

[18]  Klaus Finkenzeller,et al.  Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.

[19]  Srivaths Ravi,et al.  Power emulation: a new paradigm for power estimation , 2005, Proceedings. 42nd Design Automation Conference, 2005..

[20]  Christian Steger,et al.  Accelerating early design phase differential power analysis using power emulation techniques , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[21]  Michael Hutter,et al.  RFID and Its Vulnerability to Faults , 2008, CHES.

[22]  Bashir M. Al-Hashimi,et al.  SystemC-Based Minimum Intrusive Fault Injection Technique with Improved Fault Representation , 2008, 2008 14th IEEE International On-Line Testing Symposium.

[23]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[24]  Pedro J. Gil,et al.  Improvement of fault injection techniques based on VHDL code modification , 2005, Tenth IEEE International High-Level Design Validation and Test Workshop, 2005..

[25]  Jacob A. Abraham,et al.  FERRARI: a tool for the validation of system dependability properties , 1992, [1992] Digest of Papers. FTCS-22: The Twenty-Second International Symposium on Fault-Tolerant Computing.