Securing Conditional Branches in the Presence of Fault Attacks

被引:0
作者
Schilling, Robert [1 ,2 ]
Werner, Mario [1 ]
Mangard, Stefan [1 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] Know Ctr GmbH, Graz, Austria
来源
PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE) | 2018年
基金
欧洲研究理事会;
关键词
control-flow integrity; conditional branch; fault attacks; countermeasures;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In typical software, many comparisons and subsequent branch operations are highly critical in terms of security. Examples include password checks, signature checks, secure boot, and user privilege checks. For embedded devices, these security-critical branches are a preferred target of fault attacks as a single bit flip or skipping a single instruction can lead to complete access to a system. In the past, numerous redundancy schemes have been proposed in order to provide control flow-integrity (CFI) and to enable error detection on processed data. However, current countermeasures for general purpose software do not provide protection mechanisms for conditional branches. Hence, critical branches are in practice often simply duplicated. We present a generic approach to protect conditional branches, which links an encoding-based comparison result with the redundancy of CFI protection mechanisms. The presented approach can be used for all types of data encodings and CFI mechanisms and maintains their error-detection capabilities throughout all steps of a conditional branch. We demonstrate our approach by realizing an encoded comparison based on AN-codes, which is a frequently used encoding scheme to detect errors on data during arithmetic operations. We extended the LLVM compiler so that standard code and conditional branches can be protected automatically and analyze its security. Our design shows that the overhead in terms of size and runtime is lower than state-of-the-art duplication schemes.
引用
收藏
页码:1586 / 1591
页数:6
相关论文
共 21 条
[1]  
Abadi M., 2005, C COMP COMM SEC CCS
[2]  
[Anonymous], BELL LABS TECHNICAL
[3]  
Barenghi A., 2010, P 5 WORKSH EMB SYST, P1
[4]  
Barenghi A., FAULT DIAGNOSIS TOLE
[5]  
Barry T., 2016, CRYPTOGRAPHY SECURIT
[6]  
Biham Eli, 1997, ADV CRYPTOLOGY CRYPT
[7]  
Boneh D., 2001, J CRYPTOLOGY
[8]  
Brown D. T., 1960, IRE T ELECT COMPUTER
[9]  
Chen C., 2003, INFORM SECURITY PRIV
[10]  
de Clercq R., 2016, DES AUT TEST EUR C E