TY - JOUR
T1 - An adaptive multiple-fault injection attack on microcontrollers and a countermeasure
AU - Endo, Sho
AU - Homma, Naofumi
AU - Hayashi, Yu ichi
AU - Takahashi, Junko
AU - Fuji, Hitoshi
AU - Aoki, Takafumi
N1 - Publisher Copyright:
Copyright © 2015 The Institute of Electronics, Information and Communication Engineers.
PY - 2015/1/1
Y1 - 2015/1/1
N2 - This paper proposes a multiple-fault injection attack based on adaptive control of fault injection timing in embedded microcontrollers. The proposed method can be conducted under the black-box condition that the detailed cryptographic software running on the target device is not known to attackers. In addition, the proposed method is non-invasive, without the depackaging required in previous works, since such adaptive fault injection is performed by precisely generating a clock glitch. We first describe the proposed method which injects two kinds of faults to obtain a faulty output available for differential fault analysis while avoiding a conditional branch in a typical recalculation-based countermeasure. We then show that the faulty output can be obtained by the proposed method without using information from the detailed instruction sequence. In particular, the validity of the proposed method is demonstrated through experiments on Advanced Encryption Standard (AES) software with a recalculation-based countermeasure on 8-bit and 32-bit microcontrollers. We also present a countermeasure resistant to the proposed method.
AB - This paper proposes a multiple-fault injection attack based on adaptive control of fault injection timing in embedded microcontrollers. The proposed method can be conducted under the black-box condition that the detailed cryptographic software running on the target device is not known to attackers. In addition, the proposed method is non-invasive, without the depackaging required in previous works, since such adaptive fault injection is performed by precisely generating a clock glitch. We first describe the proposed method which injects two kinds of faults to obtain a faulty output available for differential fault analysis while avoiding a conditional branch in a typical recalculation-based countermeasure. We then show that the faulty output can be obtained by the proposed method without using information from the detailed instruction sequence. In particular, the validity of the proposed method is demonstrated through experiments on Advanced Encryption Standard (AES) software with a recalculation-based countermeasure on 8-bit and 32-bit microcontrollers. We also present a countermeasure resistant to the proposed method.
KW - Cryptographic software
KW - Embedded microcontrollers
KW - Fault injection attacks
UR - http://www.scopus.com/inward/record.url?scp=84924543500&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84924543500&partnerID=8YFLogxK
U2 - 10.1587/transfun.E98.A.171
DO - 10.1587/transfun.E98.A.171
M3 - Article
AN - SCOPUS:84924543500
SN - 0916-8508
VL - E98A
SP - 171
EP - 181
JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IS - 1
ER -