Optimized Lightweight Hardware Trojan-based Fault Attack on DES

被引:0
|
作者
Zhang, Fan [1 ]
Zhang, Yiran [1 ]
Shi, Shengwen [2 ]
Guo, Shize [2 ]
Liang, Ziyuan [1 ]
Qureshi, Samiya [1 ]
Xu, Congyuan [3 ]
机构
[1] Zhejiang Univ, Inst Cyber Secur Res, Coll Informat Sci & Elect Engn, Hangzhou, Zhejiang, Peoples R China
[2] Inst North Elect Equipment, Dept Informat Secur, Beijing, Peoples R China
[3] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Fault Injection; Lightweight Hardware Trojan; Algebraic Fault Analysis; DES;
D O I
10.1109/ICPADS.2018.00090
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An optimized lightweight Hardware Trojan (HT) based fault attack is proposed, especially for those resource constrained environments such as IoT networks. Firstly, Algebraic fault analysis (AFA) is introduced to evaluate different fault models and search for the optimal one. Next, considering the limited resource, a lightweight HT is carefully designed which only flips one bit of the circuit in IoT device. Finally, AFA is applied again to exploit the fault and recover the secret key. An illustrative attack is demonstrated on DES implemented on an FPGA platform, SASEBO-GII. This paper shows that, for single bit fault injection at different rounds or different indexes in the same round, the reduced key search space of DES varies. The proposed technique can search for the optimal fault model, guide the lightweight Hardware Trojan design and automatically recover the secret key. Only one fault is required to recover the secret key of DES, which improves the stealthiness of the designed Hardware Trojan in IoT networks. The entire attack framework can also be applied to other block ciphers such as AES and PRESENT.
引用
收藏
页码:654 / 661
页数:8
相关论文
共 50 条
  • [31] INFECT: INiconspicuous FEC-based Trojan: a Hardware Attack on an 802.11 a/g Wireless Network
    Subramani, Kiruba Sankaran
    Antonopoulos, Angelos
    Abotabl, Ahmed Attia
    Nosratinia, Aria
    Makris, Yiorgos
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 90 - 94
  • [32] DARK-Adders: Digital Hardware Trojan Attack on Block-based Approximate Adders
    Mishra, Vishesh
    Hassan, Neelofar
    Mehta, Akshay
    Chatterjee, Urbi
    2023 36TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2023 22ND INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, VLSID, 2023, : 371 - 376
  • [33] Hardware Trojan attacks on voltage scaling-based side-channel attack countermeasure
    Yu, Weize
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (03) : 321 - 326
  • [34] A CatBoost Based Approach to Detect Label Flipping Poisoning Attack in Hardware Trojan Detection Systems
    Richa Sharma
    G. K. Sharma
    Manisha Pattanaik
    Journal of Electronic Testing, 2022, 38 : 667 - 682
  • [35] A CatBoost Based Approach to Detect Label Flipping Poisoning Attack in Hardware Trojan Detection Systems
    Sharma, Richa
    Sharma, G. K.
    Pattanaik, Manisha
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2022, 38 (06): : 667 - 682
  • [36] Fault Attack Against Lightweight Block Cipher Based on Cube Analysis
    Huang, Changyang
    Wang, Tao
    Wang, Xiaohan
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1567 - 1570
  • [37] Differential Fault Attack of Lightweight Cipher GIFT Based on Byte Model
    Gao, Yuan
    Zhang, Zhongya
    Zhang, Zhiyong
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (01): : 435 - 444
  • [38] A Smart Design of Hardware Trojan and Differential Fault Analysis in AES
    Wang, Xiaohan
    Wang, Tao
    Li, Xiongwei
    Zhang, Yang
    Huang, Changyang
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1548 - 1551
  • [39] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [40] Leveraging Unspecified Functionality in Obfuscated Hardware for Trojan and Fault Attacks
    Hu, Wei
    Ma, Yixin
    Wang, Xinmu
    Wang, Xingxin
    PROCEEDINGS OF THE 2019 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2019,