Practical, Low-Cost Fault Injection Attacks on Personal Smart Devices

被引:6
作者
Delarea, Shaked [1 ]
Oren, Yossi [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Fac Engn Sci, IL-8410501 Beer Sheva, Israel
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 01期
关键词
fault injection; fault injection attacks; hardware attacks; cryptography;
D O I
10.3390/app12010417
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Fault attacks are traditionally considered under a threat model that assumes the device under test is in the possession of the attacker. We propose a variation on this model. In our model, the attacker integrates a fault injection circuit into a malicious field-replaceable unit, or FRU, which is later placed by the victim in close proximity to their own device. Examples of devices which incorporate FRUs include interface cards in routers, touch screens and sensor assemblies in mobile phones, ink cartridges in printers, batteries in health sensors, and so on. FRUs are often installed by after-market repair technicians without properly verifying their authenticity, and previous works have shown they can be used as vectors for various attacks on the privacy and integrity of smart devices. We design and implement a low-cost fault injection circuit suitable for placement inside a malicious FRU, and show how it can be used to practically extract secrets from a privileged system process through a combined hardware-software approach, even if the attacker software application only has user-level permissions. Our prototype produces highly effective and repeatable attacks, despite its cost being several orders of magnitude less than that of commonly used fault injection analysis lab setups. This threat model allows fault attacks to be carried out remotely, even if the device under test is in the hands of the victim. Considered together with recent advances in software-only fault attacks, we argue that resistance to fault attacks should be built into additional classes of devices.
引用
收藏
页数:10
相关论文
共 23 条
  • [1] Beckers A., 2019, DESIGN CONSIDERATION, V1183, P176
  • [2] Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
  • [3] Boneh D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P37
  • [4] Bukasa S.K., 2018, LET US SHOCK OUR IOT
  • [5] Cui A., 2017, BADFET DEFEATING MOD
  • [6] Design and Evaluation of Low-Complexity Radiation Hardened CMOS Latch for Double-Node Upset Tolerance
    Guo, Jing
    Liu, Shanshan
    Zhu, Lei
    Lombardi, Fabrizio
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (06) : 1925 - 1935
  • [7] Novel Low-Power and Highly Reliable Radiation Hardened Memory Cell for 65 nm CMOS Technology
    Guo, Jing
    Xiao, Liyi
    Mao, Zhigang
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2014, 61 (07) : 1994 - 2001
  • [8] Chinese remaindering based cryptosystems in the presence of faults
    Joye, M
    Lenstra, AK
    Quisquater, JJ
    [J]. JOURNAL OF CRYPTOLOGY, 1999, 12 (04) : 241 - 245
  • [9] Hardware Designer's Guide to Fault Attacks
    Karaklajic, Dusko
    Schmidt, Joern-Marc
    Verbauwhede, Ingrid
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2013, 21 (12) : 2295 - 2306
  • [10] Kenjar Z., 2019, V0LTPWN ATTACKING X8