Instruction flow-based detectors against fault injection attacks

被引:1
|
作者
Koylu, Troya Cagil [1 ]
Reinbrecht, Cezar Rodolfo Wedig [1 ]
Brandalero, Marcelo [2 ]
Hamdioui, Said [1 ]
Taouil, Mottaqiallah [1 ]
机构
[1] Delft Univ Technol, Delft, South Holland, Netherlands
[2] Brandenburg Tech Univ Cottbus, Brandenburg, Germany
关键词
Fault injection; Countermeasure; Machine learning; Recurrent neural network; Content addressable memory; Bloom filter; MEMORY; RSA; RESISTANT; CRT;
D O I
10.1016/j.micpro.2022.104638
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fault injection attacks are a threat to all digital systems, especially to the ones conducting security sensitive operations. Recently, the strategy of observing the instruction flow to detect attacks has gained popularity. In this paper, we provide a comparative study between three hardware-based techniques (i.e., recurrent neural network (RNN), content addressable memory (CAM), and Bloom filter (BF)) that detect fault attacks against software RSA decryption. After conducting experiments with various fault models, we observed that the CAM provides the best detection rate, the RNN provides the most software/application flexibility, and the BF is a middle ground between the two. Regardless, all of them exhibit robustness against faults targeted at them, and obtain a very high detection rate when faults change instructions altogether. This affirms the validity of monitoring the integrity of the instruction flow as a strong countermeasure against any type of fault attack.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Parity Check Based Fault Detection against Timing Fault Injection Attacks
    Zhang, Maoshen
    Li, He
    Wang, Peijing
    Liu, Qiang
    ELECTRONICS, 2022, 11 (24)
  • [2] Active Shielding Against Physical Attacks by Observation and Fault Injection: ChaXa
    Clément Gaine
    Jean-Pierre Nikolovski
    Driss Aboulkassimi
    Jean-Max Dutertre
    Journal of Hardware and Systems Security, 2023, 7 (1) : 1 - 10
  • [3] Deterministic and Statistical Strategies to Protect ANNs against Fault Injection Attacks
    Koylu, Troya Cagil
    Reinbrecht, Cezar Rodolfo Wedig
    Hamdioui, Said
    Taouil, Mottaqiallah
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [4] Matrix-Completion-Based False Data Injection Attacks Against Machine Learning Detectors
    Liu, Bo
    Wu, Hongyu
    Yang, Qihui
    Zhang, Hang
    Liu, Yajing
    Zhang, Yingchen
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (02) : 2146 - 2163
  • [5] Smart Redundancy Schemes for ANNs Against Fault Attacks
    Koylu, Troya Cagil
    Hamdioui, Said
    Taouil, Mottaqiallah
    2022 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2022), 2022,
  • [6] Trivium Stream Cipher Countermeasures Against Fault Injection Attacks and DFA
    Potestad-Ordonez, F. E.
    Tena-Sanchez, E.
    Mora-Gutierrez, J. M.
    Valencia-Barrero, M.
    Jimenez-Fernandez, C. J.
    IEEE ACCESS, 2021, 9 : 168444 - 168454
  • [7] Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks
    Danger, Jean-Luc
    Facon, Adrien
    Guilley, Sylvain
    Heydemann, Karine
    Kuhne, Ulrich
    Merabet, Abdelmalek Si
    Timbert, Michael
    Pecatte, Baptiste
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 254 - 274
  • [8] Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator
    Sakamoto, Junichi
    Hayashi, Shungo
    Fujimoto, Daisuke
    Matsumoto, Tsutomu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2739 - 2753
  • [9] Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator
    Junichi Sakamoto
    Shungo Hayashi
    Daisuke Fujimoto
    Tsutomu Matsumoto
    Cluster Computing, 2022, 25 : 2739 - 2753
  • [10] Custom Instruction Support for Modular Defense Against Side-Channel and Fault Attacks
    Kiaei, Pantea
    Mercadier, Darius
    Dagand, Pierre-Evariste
    Heydemann, Karine
    Schaumont, Patrick
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 221 - 253