Automated Fault Analysis of Assembly Code With a Case Study on PRESENT Implementation
نویسندگان
چکیده
Fault injection attack models are normally determined by analyzing the cipher structure and finding exploitable spots in non-linear and diffusion layers. However, this level of abstraction is often too high to distinguish vulnerable parts of software implementations, due to specific operations and optimizations. On the other hand, manually analyzing the assembly code requires non-negligible amount of time and expertise. In this paper, we propose an automated approach for analyzing cipher implementations in assembly. We represent the whole assembly program as a graph, allowing us to find vulnerable spots efficiently. Fault propagation is analyzed in a subgraph constructed from each vulnerable spot, allowing us to automatically generate equations for differential fault analysis. We have created a tool that implements our approach: ATLAS – Automated TooL for Assembly analysiS. We have successfully used this tool for attacking PRESENT-80, being able to find implementation-specific vulnerabilities that can be exploited in order to recover the secret key with 16 faults. Our results show that ATLAS is useful in finding attack spots that are not visible from the cipher structure, but can be easily exploited when dealing with real-world implementations.
منابع مشابه
Process Capability Studies in an Automated Flexible Assembly Process: A Case Study in an Automotive Industry
Statistical Process Control (SPC) methods can significantly increase organizational efficiency if appropriately used. The primary goal of process capability studies is to obtain critical information about processes to render them even more effective. This paper proposes a comprehensive framework for proper implementation of SPC studies, including the design of the sampling procedure and interva...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملImprovement of Iranian Seismic Design Code Considering the Near-Fault Effects
Characteristics of ground motions close to the earthquake source can be considerably different from those of far-field motions which should be considered in design process of structures. The current study aimed to present new design response spectra for Iranian seismic design code taking into account the near-fault effects. For this purpose, a new attenuation relation based on the ground motion...
متن کامل3D stochastic rock fracture modeling related to strike-slip faults
Fault zones and fault-related fracture systems control the mechanical behaviors and fluid-flow properties of the Earth’s crust. Furthermore, nowadays, modeling is being increasingly used in order to understand the behavior of rock masses, and to determine their characteristics. In this work, fault zones and fracture patterns are reviewed, and also comprehensive studies are carried out on the fr...
متن کاملDifferential Fault Analysis Automation on Assembly Code
Over the past decades, fault injection attacks have been extensively studied due to their capability to efficiently break cryptographic implementations. Fault injection attack models are normally determined by analyzing the cipher structure and finding exploitable spots in non-linear and permutation layers. However, this level of abstraction is often too high to distinguish vulnerable parts of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017