Combined software and hardware fault injection vulnerability detection

被引:13
|
作者
Given-Wilson, Thomas [1 ]
Jafri, Nisrine [2 ]
Legay, Axel [1 ]
机构
[1] Catholic Univ Louvain, Pl Sainte Barbe 2 Bte L5-02-01, B-1348 Louvain La Neuve, Belgium
[2] CEA, 17 Ave Martyrs, F-38000 Grenoble, France
关键词
Fault injection; Vulnerability; Statistical model checking; Formal methods; EMP;
D O I
10.1007/s11334-020-00364-5
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Fault injection is a well-known method to test the robustness and security vulnerabilities of software. Software-based and hardware-based approaches have been used to detect fault injection vulnerabilities. Software-based approaches typically rely upon simulations that can provide broad and rapid coverage, but may not correlate with genuine hardware vulnerabilities. Hardware-based experiments are indisputable in their results, but rely upon expensive expert knowledge and manual testing yielding ad hoc and extremely limited results. Further, there is very limited connection between software-based simulation results and hardware-based experiments. This work bridges software-based and hardware-based fault injection vulnerability detection by contrasting results of both approaches. This demonstrates that: not all software-based vulnerabilities can be reproduced in hardware; prior conjectures on the fault model for electromagnetic pulse attacks may not be accurate; and that there is a co-relation between software-based and hardware-based approaches. Further, combining both approaches can yield a vastly more accurate and efficient approach to detecting genuine fault injection vulnerabilities.
引用
收藏
页码:101 / 120
页数:20
相关论文
共 50 条
  • [41] Expert System Hardware for Fault Detection
    Miguel Rodríguez Gómez
    Joseba Ezquerra Ventosa
    Gerardo Aranguren Aramendía
    Applied Intelligence, 1998, 9 : 245 - 262
  • [42] ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks
    Schneider, Tobias
    Moradi, Amir
    Gueneysu, Tim
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON THE THEORY OF IMPLEMENTATION SECURITY (TIS'16), 2016, : 39 - 39
  • [43] ParTI - Towards Combined Hardware Countermeasures Against Side-Channel and Fault-Injection Attacks
    Schneider, Tobias
    Moradi, Amir
    Gueneysu, Tim
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 302 - 332
  • [44] Compact sub-Vt Optical Sensor for the Detection of Fault Injection in Hardware Security Applications
    Zooker, David
    Fish, Alexander
    Keren, Osnat
    Weizman, Yoav
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [45] Error Detection in Software and Hardware Encryption
    Niemiec, Marcin
    Kotaba, Radoslaw
    Iziourov, Daniel
    Pach, Andrzej R.
    2016 INTERNATIONAL CONFERENCE ON SIGNALS AND ELECTRONIC SYSTEMS (ICSES) PROCEEDINGS, 2016, : 282 - 287
  • [46] SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
    Grycel, Jacob
    Schaumont, Patrick
    CRYPTOGRAPHY, 2021, 5 (02)
  • [47] Hardware and Software Techniques for Heterogeneous Fault-Tolerance
    Rehman, Semeen
    Kriebel, Florian
    Prabakaran, Bharath Srinivas
    Khalid, Faiq
    Shafique, Muhammad
    2018 IEEE 24TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2018), 2018, : 115 - 118
  • [48] HARDWARE AND SOFTWARE FOR FAULT-TOLERANT COMPUTING SYSTEMS
    SOGOMONYAN, ES
    SHAGAEV, IV
    AUTOMATION AND REMOTE CONTROL, 1988, 49 (02) : 129 - 151
  • [49] A UNIFORM APPROACH TO SOFTWARE AND HARDWARE FAULT-TOLERANCE
    WU, J
    WANG, Y
    FERNANDEZ, EB
    JOURNAL OF SYSTEMS AND SOFTWARE, 1994, 26 (02) : 117 - 127
  • [50] Built-in fault injection in hardware - The FIDYCO example
    Rahbaran, B
    Steininger, A
    Handl, T
    DELTA 2004: SECOND IEEE INTERNATIONAL WORKSHOP ON ELECTRONIC DESIGN, TEST APPLICATIONS, PROCEEDINGS, 2004, : 327 - 332