Evolving Genetic Algorithms for Fault Injection Attacks

被引:0
|
作者
Picek, Stjepan [1 ]
Batina, Lejla [1 ]
Jakobovic, Domagoj [2 ]
Carpi, Rafael Boix [3 ]
机构
[1] Radboud Univ Nijmegen, Inst Comp & Informat Sci, NL-6500 Nijmegen, Netherlands
[2] Univ Zagreb, Fac Elect Engn & Computing, Zagreb, Croatia
[3] Riscure BV, Delft, Netherlands
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Genetic algorithms are used today to solve numerous difficult problems. However, it is often needed to specialize and adapt them further in order to successfully tackle some specific problem. One such example is the fault injection attack where the goal is to find a specific set of parameters that can lead to a successful cryptographic attack in a minimum amount of time. In this paper we address the process of the specialization of genetic algorithm from its standard form to the final, highly-specialized one. In this process we needed to customize crossover operator, add a mapping between the values in cryptographic domain and genetic algorithm domain and finally to adapt genetic algorithm to work on-the-fly. For the last phase of development we plan to go to the memetic algorithm by adding a local search strategy. Furthermore, we give a comparison between our algorithm and random search which is the mostly employed method for this problem at the moment. Our experiments show that our algorithm significantly outperforms the random search.
引用
收藏
页码:1106 / 1111
页数:6
相关论文
共 50 条
  • [1] Evolving Quasigroups by Genetic Algorithms
    Snasel, Vaclav
    Dvorsky, Jiri
    Ochodkova, Eliska
    Kromer, Pavel
    Platos, Jan
    Abraham, Ajith
    PROCEEDINGS OF THE DATESO 2010 WORKSHOP - DATESO DATABASES, TEXTS, SPECIFICATIONS, AND OBJECTS, 2010, 567 : 108 - 117
  • [2] Faults, injection methods, and fault attacks
    Kim, Chong Hee
    Quisquater, Jean-Jacques
    IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 544 - 545
  • [3] SoK: Fault Injection Attacks on Cryptosystems
    Chiu, TingHung
    Xiong, Wenjie
    PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 64 - 72
  • [4] Evolving a virtual ecosystem with genetic algorithms
    Eccles, JS
    Dickerson, JA
    Shao, JQ
    PROCEEDINGS OF THE 2000 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2000, : 753 - 760
  • [5] Evolving probabilistic chromosomes in Genetic Algorithms
    Palazzari, P
    Coli, M
    GECCO-99: PROCEEDINGS OF THE GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 1999, : 511 - 518
  • [6] Evolving Distributed Algorithms With Genetic Programming
    Weise, Thomas
    Tang, Ke
    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2012, 16 (02) : 242 - 265
  • [7] Fault Attacks, Injection Techniques and Tools for Simulation
    Piscitelli, Roberta
    Bhasin, Shivam
    Regazzoni, Francesco
    2015 10TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS), 2015,
  • [8] How Practical Are Fault Injection Attacks, Really?
    Breier, Jakub
    Hou, Xiaolu
    IEEE ACCESS, 2022, 10 : 113122 - 113130
  • [9] Detecting Fault Injection Attacks with Runtime Verification
    Kassem, Ali
    Falcone, Ylies
    SPRO'19: PROCEEDINGS OF THE 3RD ACM WORKSHOP ON SOFTWARE PROTECTION, 2019, : 65 - 76
  • [10] Stratification of Hardware Attacks: Side Channel Attacks and Fault Injection Techniques
    Kaur S.
    Singh B.
    Kaur H.
    SN Computer Science, 2021, 2 (3)