Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms

Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems int...

Full description

Bibliographic Details
Main Authors: Bhasin, Shivam, Mukhopadhyay, Debdeep
Other Authors: 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering
Format: Conference Paper
Language:English
Published: 2017
Subjects:
Online Access:https://hdl.handle.net/10356/82845
http://hdl.handle.net/10220/42605
_version_ 1826125112935448576
author Bhasin, Shivam
Mukhopadhyay, Debdeep
author2 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering
author_facet 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering
Bhasin, Shivam
Mukhopadhyay, Debdeep
author_sort Bhasin, Shivam
collection NTU
description Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical nature. This tutorial addresses this issue of fault attacks, covering a wide range of topics which has accumulated through years of research. The first part of the talk will cover fault attacks and its application to attack standard cryptosystems. Different popular forms of fault attacks, namely Differential Fault Attacks (DFA) and Differential Fault Intensity Attacks (DFIA) are presented. It is followed subsequently by a discussion on the underlying injection techniques. Finally, protection mechanism will be discussed highlighting on information redundancy based reactive countermeasures and sensor-based protection mechanisms as two alternative strategies for security against the menacing fault attacks.
first_indexed 2024-10-01T06:31:22Z
format Conference Paper
id ntu-10356/82845
institution Nanyang Technological University
language English
last_indexed 2024-10-01T06:31:22Z
publishDate 2017
record_format dspace
spelling ntu-10356/828452020-09-26T22:15:53Z Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms Bhasin, Shivam Mukhopadhyay, Debdeep 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering Temasek Laboratories Differential fault analysis Fault injection attacks Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical nature. This tutorial addresses this issue of fault attacks, covering a wide range of topics which has accumulated through years of research. The first part of the talk will cover fault attacks and its application to attack standard cryptosystems. Different popular forms of fault attacks, namely Differential Fault Attacks (DFA) and Differential Fault Intensity Attacks (DFIA) are presented. It is followed subsequently by a discussion on the underlying injection techniques. Finally, protection mechanism will be discussed highlighting on information redundancy based reactive countermeasures and sensor-based protection mechanisms as two alternative strategies for security against the menacing fault attacks. Accepted version 2017-06-07T06:01:37Z 2019-12-06T15:06:45Z 2017-06-07T06:01:37Z 2019-12-06T15:06:45Z 2016-12-01 2016 Conference Paper Bhasin, S., & Mukhopadhyay, D. (2016). Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms. 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering, 415-418. https://hdl.handle.net/10356/82845 http://hdl.handle.net/10220/42605 10.1007/978-3-319-49445-6_24 199333 en © 2016 Springer International Publishing AG. This is the author created version of a work that has been peer reviewed and accepted for publication by 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering, Springer International Publishing AG. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://doi.org/10.1007/978-3-319-49445-6_24]. 4 p. application/pdf
spellingShingle Differential fault analysis
Fault injection attacks
Bhasin, Shivam
Mukhopadhyay, Debdeep
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title_full Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title_fullStr Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title_full_unstemmed Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title_short Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title_sort fault injection attacks attack methodologies injection techniques and protection mechanisms
topic Differential fault analysis
Fault injection attacks
url https://hdl.handle.net/10356/82845
http://hdl.handle.net/10220/42605
work_keys_str_mv AT bhasinshivam faultinjectionattacksattackmethodologiesinjectiontechniquesandprotectionmechanisms
AT mukhopadhyaydebdeep faultinjectionattacksattackmethodologiesinjectiontechniquesandprotectionmechanisms