SLIDE 1
Jrn-Marc Schmidt joern-marc.schmidt@iaik.tugraz.at Fault Injection - - PowerPoint PPT Presentation
Jrn-Marc Schmidt joern-marc.schmidt@iaik.tugraz.at Fault Injection - - PowerPoint PPT Presentation
Jrn-Marc Schmidt joern-marc.schmidt@iaik.tugraz.at Fault Injection Plaintext Faulty Ciphertext But how to inject a fault? Fault: Injection Model Exploitation Non-invasive Device is not altered physical Semi-invasive
SLIDE 2
SLIDE 3
Fault:
- Injection
- Model
- Exploitation
SLIDE 4
Non-invasive Device is not altered physical Semi-invasive De-packaging, no electrical contact Invasive No limits
SLIDE 5
Active (Fault Attacks) Passive (Observing Attacks) Non-Invasive Glitch attacks, Power Spikes, … Side-Channel Attacks Semi-Invasive Optical Fault Injection, … Optical inspection (ROM, …) Invasive Permanent circuit changes, … Probing, …
SLIDE 6
Probing station Oscilloscope Focused Ion Beam (FIB) Microscope
SLIDE 7
SLIDE 8
- Class I
Clever Outsider
- Class II
Knowledgeable Insider
- Class III
Funded Company
SLIDE 9
SLIDE 10
SLIDE 11
SLIDE 12
Decapsulation Procedure:
1. Mill a hole 2. Etch with Fuming Nitric Acid 3. Clean with Ultrasonic treatment in Acetone
SLIDE 13
SLIDE 14
- Light creates electron / hole pair
- Near np junction: hole moves to p, electron to n region
- Results in current and maybe a transition of a transistor
- Called Optical Beam Induced Current (OBIC)
Light n region p region Electron Hole
SLIDE 15
SLIDE 16
- Fault Type
–Transient –Permanent –Destructive
- Timing
- Precision
(Bit, Byte, Word)
- Set, Flip, Program Flow..
SLIDE 17
pq d M pq q d M p d M CRT Sig mod mod ) mod , mod ( = = pq p d M pq q d M p d M CRT Sig mod mod ) mod , mod ( ∆ + = + = δ ) , ( pq Sig Sig GCD p − =
p, q: large primes M: message to sign d: secret key
a random fault
SLIDE 18
Manipulation of:
– Loops – Checks
- Repeat
transmit (*MSG_address); MSG_length+ + ; MSG_address+ + ; until(MSG_length= = 5);
SLIDE 19
SLIDE 20
SLIDE 21
SLIDE 22
SLIDE 23
SLIDE 24
SLIDE 25
AddRoundKey SubBytes ShiftRows AddRoundKey … Ciphertext MixColumns
- Alter Ciphertext
- Set Bit before SB
- Fault before MC
(𝜀, 0,0,0)
SLIDE 26
Error Messages Timing Electromagnetic Emanation Power Consumption Fault Injection
SLIDE 27
SLIDE 28
SLIDE 29
0 =
R
SLIDE 30
SLIDE 31
- An adversary can inject more than a single fault.
- Can we do better than doubling?
- How to built efficient side-channel and fault
countermeasures?
SLIDE 32
- Fault attacks are powerful
- Possible attacks depend on adversary
- Stick to realistic fault models