Countermeasures Against Fault Injection Attacks in Processors: A Review

被引:0
作者
Boulifa, Roua [1 ]
Di Natale, Giorgio [1 ]
Maistri, Paolo [1 ]
机构
[1] Univ Grenoble Alpes, CNRS, Grenoble INP1, TIMA, F-38000 Grenoble, France
关键词
hardware security; fault injection attacks; countermeasures; RISC-V security;
D O I
10.3390/info16040293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical attacks pose a significant threat to the security of embedded processors, which have become an integral part of our daily lives. Processors can be vulnerable to fault injection attacks that threaten their normal and secure behavior. Such attacks can lead to serious malfunctions in applications, compromising their security and correct behavior. Therefore, it is crucial for designers and manufacturers to consider these threats while developing embedded processors. These attacks may require only a moderate level of knowledge to execute and can compromise the normal behavior of the targeted devices. These attacks can be faced by developing effective countermeasures. This paper explores the main existing countermeasures against fault injection attacks in embedded processors, to understand and implement effective solutions against those threats. Subsequently, we further investigate solutions related to RISC-V, focusing on its hardware and architecture security.
引用
收藏
页数:22
相关论文
共 50 条
[41]   Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks [J].
Gao, Pengfei ;
Zhang, Yedi ;
Song, Fu ;
Chen, Taolue ;
Standaert, Francois-Xavier .
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA)
[42]   Protecting RSA Against Fault Attacks: The Embedding Method [J].
Joye, Marc .
PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, :41-45
[43]   Protecting RSA Against Fault Attacks: The Embedding Method [J].
Joye, Marc .
2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, :41-45
[44]   On robustness and countermeasures of Reliable Server Pooling systems against denial of service attacks [J].
Dreibholz, Thomas ;
Rathgeb, Erwin P. ;
Zhou, Xing .
NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 :586-+
[45]   A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords [J].
Por, Lip Yee ;
Ng, Ian Ouii ;
Chen, Yen-Lin ;
Yang, Jing ;
Ku, Chin Soon .
IEEE ACCESS, 2024, 12 :53408-53423
[46]   Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks [J].
Perin, Guilherme ;
Imbert, Laurent ;
Torres, Lionel ;
Maurine, Philippe .
SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 :200-215
[47]   A review on safety failures, security attacks, and available countermeasures for autonomous vehicles [J].
Cui, Jin ;
Liew, Lin Shen ;
Sabaliauskaite, Giedre ;
Zhou, Fengjun .
AD HOC NETWORKS, 2019, 90
[48]   Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round 3 KEM Candidates [J].
Xagawa, Keita ;
Ito, Akira ;
Ueno, Rei ;
Takahashi, Junko ;
Homma, Naofumi .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 :33-61
[49]   Attacks and Countermeasures on AES and ECC [J].
Tange, Henrik ;
Andersen, Birger .
2013 16TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2013,
[50]   Review of countermeasures against beach erosion on the Taiwanese coast [J].
Hsu, Tai-Wen ;
Tseng, I-Fan ;
Lin, Ta-Yuan ;
Shin, Chih-Yung ;
Ou, Shan-Hwei .
COASTAL MANAGEMENT, 2008, 36 (03) :274-293