Optimized Lightweight Hardware Trojan-based Fault Attack on DES

被引:0
|
作者
Zhang, Fan [1 ]
Zhang, Yiran [1 ]
Shi, Shengwen [2 ]
Guo, Shize [2 ]
Liang, Ziyuan [1 ]
Qureshi, Samiya [1 ]
Xu, Congyuan [3 ]
机构
[1] Zhejiang Univ, Inst Cyber Secur Res, Coll Informat Sci & Elect Engn, Hangzhou, Zhejiang, Peoples R China
[2] Inst North Elect Equipment, Dept Informat Secur, Beijing, Peoples R China
[3] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Fault Injection; Lightweight Hardware Trojan; Algebraic Fault Analysis; DES;
D O I
10.1109/ICPADS.2018.00090
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An optimized lightweight Hardware Trojan (HT) based fault attack is proposed, especially for those resource constrained environments such as IoT networks. Firstly, Algebraic fault analysis (AFA) is introduced to evaluate different fault models and search for the optimal one. Next, considering the limited resource, a lightweight HT is carefully designed which only flips one bit of the circuit in IoT device. Finally, AFA is applied again to exploit the fault and recover the secret key. An illustrative attack is demonstrated on DES implemented on an FPGA platform, SASEBO-GII. This paper shows that, for single bit fault injection at different rounds or different indexes in the same round, the reduced key search space of DES varies. The proposed technique can search for the optimal fault model, guide the lightweight Hardware Trojan design and automatically recover the secret key. Only one fault is required to recover the secret key of DES, which improves the stealthiness of the designed Hardware Trojan in IoT networks. The entire attack framework can also be applied to other block ciphers such as AES and PRESENT.
引用
收藏
页码:654 / 661
页数:8
相关论文
共 50 条
  • [21] A Machine Learning Based Automatic Hardware Trojan Attack Space Exploration and Benchmarking Framework
    Cruz, Jonathan
    Gaikwad, Pravin
    Nair, Abhishek
    Chakraborty, Prabuddha
    Bhunia, Swarup
    2022 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2022,
  • [22] Packet Header Attack by Hardware Trojan in NoC based TCMP and its Impact Analysis
    Kulkarni, Vedika J.
    Manju, R.
    Gupta, Ruchika
    Jose, John
    Nandi, Sukumar
    2021 15TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON NETWORKS-ON-CHIP (NOCS 2021), 2021, : 21 - 28
  • [23] AI Trojan Attack for Evading Machine Learning-based Detection of Hardware Trojans
    Pan, Zhixin
    Mishra, Prabhat
    IEEE Transactions on Computers, 2023, : 1 - 14
  • [24] A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection
    Vidya Govindan
    Rajat Subhra Chakraborty
    Pranesh Santikellur
    Aditya Kumar Chaudhary
    Journal of Hardware and Systems Security, 2018, 2 (3) : 225 - 239
  • [25] Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon
    Halak, Basel
    Duarte-Sanchez, Jorge
    2020 IEEE 33RD INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2020, : 43 - 47
  • [26] Dynamic Game for Strategy Selection in Hardware Trojan Attack and Defense
    Yang, Daming
    Gao, Cheng
    Huang, Jiaoying
    IEEE ACCESS, 2020, 8 (213094-213103) : 213094 - 213103
  • [27] Hardware Trojan Enabled Denial of Service Attack on CAN Bus
    Bozdal, Mehmet
    Randa, Maulana
    Samie, Mohammad
    Jennions, Ian
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON THROUGH-LIFE ENGINEERING SERVICES, 2018, 16 : 47 - 52
  • [28] edAttack: Hardware Trojan Attack on On-Chip Packet Compression
    Kumar, Atul
    Deb, Dipika
    Das, Shirshendu
    Das, Palash
    IEEE DESIGN & TEST, 2023, 40 (06) : 125 - 135
  • [29] Optimized Linear Complementary Codes Implementation for Hardware Trojan Prevention
    Carlet, Claude
    Daif, Abderrahman
    Danger, Jean-Luc
    Guilley, Sylvain
    Najm, Zakaria
    Xuan Thuy Ngo
    Porteboeuf, Thibault
    Tavernier, Cedric
    2015 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN (ECCTD), 2015, : 57 - 60
  • [30] ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch
    Govindan, Vidya
    Koteshwara, Sandhya
    Das, Amitabh
    Parhi, Keshab K.
    Chakraborty, Rajat Subhra
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 159 - 175