Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.2.285

The Study on Fault Injection Attack: The analysis and improvement of the experimental precision indicators  

Kim, HyunHo (Dongseo University)
Kang, Young-Jin (Dongseo University)
Lee, Young-Sil (Dongseo University)
Park, Jae-Hoon (Electronics and Telecommunications Research Institute)
Kim, Chang-Kyun (Electronics and Telecommunications Research Institute)
Lee, HoonJae (Electronics and Telecommunications Research Institute)
Abstract
As the utilization rate of smart device increases, various applications for smart device have been developed. Since these applications can contain important data related to user behaviors in digital forensic perspective, the analysis of them should be conducted in advance. However, lots of applications get to have new data format or type when they are updated. Therefore, whether the applications are updated or not should be checked one by one, and if they are, whether their data are changed should be also analyzed. But observing application data repeatedly is a time-consuming task, and that is why the effective method for dealing with this problem is needed. This paper suggests the automatic system which gets updated information and checks changed data by collecting application information.
Keywords
Digital Forensics; Smartphone Forensics; Android Forensics; Android Application; Android Data Acquisition;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Y. Monnet, M. Renaudin, and F. M'Buwa Nzengust "Practical Evaluation of Fault Countermeasures on an Asynchronous DES Crypto Processor," Proceedings of the 12th IEEE International On-Line Testing Symposium, 2006
2 Sergei Skorobogatov, "Optical Fault masking Attacks," Workshop on Fault diagnosis and Tolerance in Cryptography, pp. 23-29, Aug, 2010
3 Jacques J.A. Fournier and Philippe Loubet-Moundi, "Memory address Scrambling Revealed using Fault Attacks," Workshop on Fault diagnosis and Tolerance in Cryptography, pp. 30-36, Aug. 2010
4 J. G. J. van Woudenberg, M. F. Witteman and Federico Menarini, "Practical Optical Fault Injection on Secure Microcontrollers," Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 91-99, 2011
5 Sergei Skorobogatov, "Local Heating Attacks on Flash Memory Devices," International Workshop on Hardware-Oriented Security and Trust, 2009
6 G. Canivet, J. Clediere, and R. Leveugle, "Detailed Analysises of Single laser Shot Effects in the Configuration of a Virtex-II FPGA," International On-Line Testing Symposium, pp. 289-294, 2008
7 Doo-sik Choi, Yong-Je Choi, and Jae-cheol Ha, "A Late-Round Reduction Attack on the AES Encryption Algorithm Using Fault Injection," Journal of The Korea Institute of information Security & Cryptology, 22(3), pp. 339-445, Jun. 2012   과학기술학회마을
8 KiSeok Bae, JeaHoon Park, and SangJae Moon, "Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System," Journal of The Korea Institute of information Security & Cryptology, 21(3), pp. 11-25, Jun. 2011   과학기술학회마을
9 Doo-sik Choi, Doo-hwan Oh, and Jae-cheol Ha "A Round Reduction Attack on Triple DES Using Fault Injection", Journal of The Korea Institute of information Security & Cryptology, 21(2), pp. 91-100, Apl. 2011   과학기술학회마을
10 JeaHoon Park, KiSeok Bae, and JaeCheol Ha, "A Fault Injection Attack on the For Statement in AES Implementation," Journal of The Korea Institute of information Security & Cryptology, 20(6), pp. 59-65, Dec. 2010   과학기술학회마을
11 JeaHoon Park and JaeCheol Ha, "Improved Differential Fault Analysis on Block Cipher ARIA," International Workshop on Information Security Applications, LNCS 7690, pp. 82-95, 2012
12 E.Trichina. R. Korkikyan, "Multi Fault Laser Attacks on Protected CRT-RSA," Workshop on Fault diagnosis and Tolerance in Cryptography, pp. 75-86, 2010
13 H. Bar-El, H. Choukri, and C. Whelan, "The Sorcerer's Apprentice Guide to Fault Attacks," Proceedings of the IEEE, vol. 94, no. 2, pp. 371-382, Feb. 2006.
14 D. Bonech, R. DeMillo and R. Lipton, "New threat model breaks crypto codes," Bellcore Press Release, Sep. 1996.
15 Sergei P. Skorobogatov, "Semi-invasive attacks: A new approach to hardware security analysis," Technical Report UCAM-CL-TR-630, University of Cambridge, Apl. 2005.
16 Johannes Blömer and Jean-Pierre Seifert, "Fault based cryptanalysis of the Advanced Encryption Standard (AES)," Financial Cryptography, pp. 162-181, 2003.
17 C. Aumuller, P. Bier, and J. P. Seifert, "Fault attacks on RSA with CRT: Concrete results and practical countermeasures," Workshop on Cryptographic Hardware and Embedded Systems, LNCS 2523, pp. 260-275, 2002.
18 A. Barenghi, G. Bertoni, and G. Pelosi, "Low Voltage Fault Attacks on the RSA cryptosystem," Workshop on Fault Diagnosis and Tolerance in Cryptography, pp.23-31, 2009.
19 Sergei P. Skorobogatov and Ross J. Anderson, "Optical Fault Induction Attacks," Workshop on Fault Diagnosis and Tolerance in Cryptography, LNCS 2523, pp. 2-12, 2003.
20 O. Kocar, "Hardwaresicherheit von Mikrochips in Chipkarten," Datenschutz and Datensicherheit, vol. 20, no. 7, pp. 421-424, 1996.
21 S. Govindavajhala and A. Appel, "Using memory errors to attack a virtual machine," In Proceedings of the IEEE symposium on Security and Privacy, pp. 154-164, May. 2003.
22 Oliver Kommerling and Markus G. Kuhn, "Design principles for tamper-resistan smartcard processors," Proceedings of the USENIX Workshop on Smartcard Technology, pp.9-20, May. 1999.
23 S. H. Weingart, "Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses," Workshop on Cryptographic Hardware and Embedded Systems, LNCS 1965, pp. 302-317, 2000.
24 Elena Trichina and Roman Korkikyan, "Multi Fault Laser Attacks on Protected CRT-RSA," Workshop on Fault diagnosis and Tolerance in Cryptography, pp. 75-86, Aug. 2010
25 Young-Sil Lee, HyunHo Kim and HoonJae Lee, "A study on generalization of Fault-Injection Analysis tools", Dongseo University Industry-Academic Cooperation Foundation, pp. 1-205, Otc. 2013.
26 Sergei Skorobogatov, "Low temperature data remanence in static RAM," Technical Report UCAM-CL-TR-536, University of Cambridge, Jun. 2002.