A Low-cost Function Call Protection Mechanism Against Instruction Skip Fault Attacks

被引:3
作者
Yao, Yuan [1 ]
Schaumont, Patrick [1 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
来源
PROCEEDINGS OF THE 2018 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'18) | 2018年
基金
美国国家科学基金会;
关键词
Fault attack; Instruction skip; Low-cost countermeasure; Function call protection; Fault detection; CONCURRENT ERROR-DETECTION;
D O I
10.1145/3266444.3266453
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fault attack is a known, dangerous threat to secure embedded systems. Function calls, including system calls, are particularly important but weak links for the integration of security components in a crypto-system. Function calls are vulnerable to an instruction skip caused by controlled fault injection such as clock glitching or power glitching. Previous work fails to address the vulnerability of function calls to instruction skip and develop corresponding countermeasures. In this paper, we provide a software fault detection mechanism to protect function calls against instruction skip attacks. Our method is generic, relies on the function output arguments, and does not require modification to the function body. We demonstrate our methodology on Gaisler's LEON3 simulator and quantify the overhead. Compared to a traditional function call duplication countermeasure, our proposed fault detection mechanism is a low-cost, low-overhead protection against instruction skip attacks.
引用
收藏
页码:55 / 64
页数:10
相关论文
共 20 条
  • [1] ANDERSON S., Bit Twiddling Hacks
  • [2] [Anonymous], 2014, UCBEECS2014 EECS
  • [3] ARM Holdings, 2013, PROC CALL STAND ARM PROC CALL STAND ARM
  • [4] The sorcerer's apprentice guide to fault attacks
    Bar-El, H
    Choukri, H
    Naccache, D
    Tunstall, M
    Whelan, C
    [J]. PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 370 - 382
  • [5] Barenghi Alessandro, 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), P7, DOI 10.1109/HST.2010.5513121
  • [6] Boneh D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P37
  • [7] Breier J., 2015, P 1 ACM WORKSH CYB P, P99
  • [8] Cojocar L., 2017, Revised Selected Papers, P160
  • [9] Recomputing with Permuted Operands: A Concurrent Error Detection Approach
    Guo, Xiaofei
    Karri, Ramesh
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2013, 32 (10) : 1595 - 1608
  • [10] Karri R, 2001, DES AUT CON, P579, DOI 10.1109/DAC.2001.935575