An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers

Autor: Werner, Vincent, Maingault, Laurent, Potet, Marie-Laure
Přispěvatelé: Département Systèmes (DSYS), Commissariat à l'énergie atomique et aux énergies alternatives - Laboratoire d'Electronique et de Technologie de l'Information (CEA-LETI), Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)
Rok vydání: 2022
Předmět:
Zdroj: Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, 2022, 12 (4), https://doi.org/10.1007/s13389-022-00292-z. ⟨10.1007/s13389-022-00292-z⟩
ISSN: 2190-8516
2190-8508
Popis: International audience; Although multi-fault attacks are powerful in defeatingsophisticated hardware and software countermeasures,detecting and exploiting multi-fault injection vulnerabilitiesremains a difficult problem, especially without anyprior knowledge of the target. We propose a new end-toendapproach to identify and exploit multi-fault injectionvulnerabilities. This tool-assisted methodology lets us configurea given fault injection equipment according to realisticmulti-fault injection simulations based on target specificfault models. In addition, we show that we experimentallyachieve with our method successful multi-fault attacks, upto 30 times faster than the characterization-based approach,on different microcontrollers and with various fault injectiontechniques.
Databáze: OpenAIRE