Hardware Fault Attack Detection Methods for Secure Embedded Systems

نویسندگان

  • Chinmay Deshpande
  • Bilgiday Yuce
  • Abhishek Bendre
  • Nahid Ghalaty
  • Conor Patrick
چکیده

In our daily life, we are increasingly putting our trust in embedded software applications, which run on a range of processor-based embedded systems from smartcards to pay-TV units. This trend expands the threat model of embedded applications from software into hardware. Over the last 20 years, fault attacks have emerged as an important class of hardware attacks against embedded software security. In fault attacks, an adversary breaks the security by injecting well chosen, targeted faults during the execution of embedded software, and systematically analyzing softwares fault response. In this work, we propose cycle-accurate and fully digital techniques that can efficiently detect different types of fault attacks. The detection methods are low-cost regarding the area and power consumption and can be easily implemented using the standard cell based VLSI design flow. In addition to the architecture of the detectors, we present a detailed analysis of the design considerations that affect the cost and accuracy of the detectors. The functionality of the detectors is validated by implementing on ASIC and FPGA platforms (Spartan-6, Cyclone IV). Additionally, the proposed detection methods have demonstrated to successfully detect all of the injected faults without any false alarm. Hardware Fault Attack Detection Methods for Secure Embedded Systems Chinmay Deshpande ABSTRACT (GENERAL AUDIENCE) Embedded systems nowadays play a very crucial role in day to day life. They are always gathering sensitive and private data of the users. So they become an attractive target for the attackers to steal this important data. As a result, the security of these devices has become a grave concern. Fault attacks are a class of hardware attacks where the attacker injects faults into the system while it is executing a known program and observes the reaction. The abnormal reactions of the system are later analyzed to obtain the valuable data. Several mechanisms to detect such attacks exist in the literature, but they are not very effective. In this work, we first analyze the effect of different types of fault attacks on the embedded processor. Then we propose various low-cost digital techniques that can efficiently detect these attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

COFTA: Hardware-Software Co-Synthesis of Heterogeneous Distributed Embedded Systems

Embedded systems employed in critical applications demand high reliability and availability in addition to high performance. Hardware-software co-synthesis of an embedded system is the process of partitioning, mapping, and scheduling its specification into hardware and software modules to meet performance, cost, reliability, and availability goals. In this paper, we address the problem of hardw...

متن کامل

Multi-level Aes Design Security: from Systemc-tlm to Fpga

Advanced Encryption Standard (AES) cryptographic system are widely used in embedded systems to secure secret information. One of the most powerful cryptanalysis techniques against the cryptographic systems is the fault injection attacks. The complexity of cryptographic systems is increasing which requires fast security attacks simulation against fault injection attacks. The multi-level Electron...

متن کامل

BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection

Numerous Electromagnetic Fault Injection (EMFI) techniques have been used to attack FPGAs, ASICs, cryptographic devices, and microcontrollers. Unlike other classes of fault injection techniques, EMFI-based attacks can, in theory, be carried out non-invasively without requiring physical contact with the victim device. Prior research has demonstrated the viability of EMFIbased attacks against rel...

متن کامل

Error Recovery Mechanism using Dynamic Partial Reconfiguration

In this paper an error recovery mechanism for SRAM based FPGA systems is presented. Previous recovery methods employ processor cores as a reconfiguration controller consuming notable amount of device resources and introducing additional error detection and recovery latency. The described mechanism is controlled by a finite state machine architecture providing small hardware overhead and short r...

متن کامل

Secure Proactive Recovery – a Hardware Based Mission Assurance Scheme

Fault tolerance via redundancy or replication is contradictory to the notion of a limited trusted computing base. Thus, normal security techniques cannot be applied to faulttolerant systems. As a result, a multi-phased approach is employed that includes fault/threat avoidance/prevention, detection and recovery. However, a determined adversary can still defeat system security by staging an attac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018