An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers
Autor: | Werner, Vincent, Maingault, Laurent, Potet, Marie-Laure |
---|---|
Přispěvatelé: | Département Systèmes (DSYS), Commissariat à l'énergie atomique et aux énergies alternatives - Laboratoire d'Electronique et de Technologie de l'Information (CEA-LETI), Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA) |
Rok vydání: | 2022 |
Předmět: | |
Zdroj: | Journal of Cryptographic Engineering Journal of Cryptographic Engineering, 2022, 12 (4), https://doi.org/10.1007/s13389-022-00292-z. ⟨10.1007/s13389-022-00292-z⟩ |
ISSN: | 2190-8516 2190-8508 |
Popis: | International audience; Although multi-fault attacks are powerful in defeatingsophisticated hardware and software countermeasures,detecting and exploiting multi-fault injection vulnerabilitiesremains a difficult problem, especially without anyprior knowledge of the target. We propose a new end-toendapproach to identify and exploit multi-fault injectionvulnerabilities. This tool-assisted methodology lets us configurea given fault injection equipment according to realisticmulti-fault injection simulations based on target specificfault models. In addition, we show that we experimentallyachieve with our method successful multi-fault attacks, upto 30 times faster than the characterization-based approach,on different microcontrollers and with various fault injectiontechniques. |
Databáze: | OpenAIRE |
Externí odkaz: |