Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.6.1247

Realistic Multiple Fault Injection System Based on Heterogeneous Fault Sources  

Lee, JongHyeok (Kookmin University)
Han, Dong-Guk (Kookmin University)
Abstract
With the advent of the smart home era, equipment that provides confidentiality or performs authentication exists in various places in real life. Accordingly security against physical attacks is required for encryption equipment and authentication equipment. In particular, fault injection attack that artificially inject a fault from the outside to recover a secret key or bypass an authentication process is one of the very threatening attack methods. Fault sources used in fault injection attacks include lasers, electromagnetic, voltage glitches, and clock glitches. Fault injection attacks are classified into single fault injection attacks and multiple fault injection attacks according to the number of faults injected. Existing multiple fault injection systems generally use a single fault source. The system configured to inject a single source of fault multiple times has disadvantages that there is a physical delay time and additional equipment is required. In this paper, we propose a multiple fault injection system using heterogeneous fault sources. In addition, to show the effectiveness of the proposed system, the results of a multiple fault injection attack against Riscure's Piñata board are shown.
Keywords
Fault Injection Attack; Multiple Fault; Heterogeneous Fault Sources;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Biham and A. Shamir, "Differential fault analysis of secret key cryptosystems," Annual international cryptology conference, pp. 513-525, 1997.
2 A. Vasselle, H. Thiebeauld, Q. Maouhoub, A. Morisset, and S. Ermeneux, "Laser-induced fault injection on smartphone bypassing the secure boot," IEEE Transactions on Computers, 2018.
3 J. Lee, Y.-J. Cho, and D.-G. Han, "Authentication Bypass Attacks By Electromagnetic Fault Injection," Conference on Information Security and Cryptography 2018 Summer, pp. 535-540, 2018.
4 Riscure, "Twin Scan LS2 Upgrade," 2020. https://getquote.riscure.com/en/quote/2101118/twin-scan-ls2-upgrade.htm
5 ALPhANOV, "Double laser fault injection microscope - D-LMS," 2020. https://www.alphanov.com/en/products-services/double-laser-fault-injection
6 Riscure, "Pinata H (Hardware crypto)," 2020. https://getquote.riscure.com/en/quote/2101126/pinata-h-hardware-crypto.htm
7 Y. Li, K. Sakiyama, S. Gomisawa, T. Fukunaga, J. Takahashi, and K. Ohta, "Fault sensitivity analysis," International Workshop on Cryptographic Hardware and Embedded Systems, pp. 320-334, 2010.
8 Riscure, "Spider," 2020. https://getquote.riscure.com/en/quote/2101116/spider.htm
9 Riscure, "EM-FI Transient Probe," 2020. https://getquote.riscure.com/en/quote/2101068/em-fi-transient-probe.htm
10 C. Giraud, "Dfa on aes," International Conference on Advanced Encryption Standard, pp. 27-41, 2004.
11 Arm, "ARM Cortex-M4." 2020. https://developer.arm.com/ip-products/processors/cortex-m/cortex-m4
12 D. Kwon, J. Kim, S. Park, S. H. Sung, Y. Sohn, J. H. Song, Y. Yeom, E.-J. Yoon, S. Lee, J. Lee, and others, "New block cipher: ARIA," International Conference on Information Security and Cryptology. pp. 432-445, 2003.
13 J. Park, and J. Ha, "Improved differential fault analysis on block cipher ARIA," International Workshop on Information Security Applications, pp. 82-95, 2012.
14 H. Park, J. Lee, and D.-G. Han, "New Differential Fault Analysis Method using Multiple Fault Injection," Conference on Electromagnetic Engineering And Science 2020 Summer, 8(1), pp. 600, 2020.
15 Korea Internet & Security Agency, "Block cipher ARIA," 2019. https://seed.kisa.or.kr/kisa/Board/19/detailView.do