LDTFI: Layout-aware Timing Fault-Injection Attack Assessment Against Differential Fault Analysis

被引:3
作者
Shuvo, Amit Mazumder [1 ]
Pundir, Nitin [1 ]
Park, Jungmin [1 ]
Farahmandi, Farimah [1 ]
Tehranipoor, Mark [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
来源
2022 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2022) | 2022年
关键词
Timing violation; fault-injection attacks; physical layout; vulnerability assessment; countermeasure;
D O I
10.1109/ISVLSI54635.2022.00036
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attackers can target a cryptographic hardware design with a low-cost setup and little effort to inject timing faults, which can be exploited to leak secret keys when paired with differential fault analysis (DFA). In the literature, proposed analysis methods and countermeasures against such attacks target higher design abstractions (e.g., RTL and gate level), and incur large area and latency overhead. Moreover, none of these proposed methodologies account for timing variations incurred by design during layout generation. In this paper, we propose an LDTFI framework to automatically analyze the viability of clock-glitch-based timing faults to perform DFA and then apply countermeasures at the layout level. LDTFI first assesses the feasibility of injecting controlled timing faults into crypto designs needed for successful DFA and then provides its vulnerability. After that, to render DFA ineffective, we ingeniously modify the design's layout to alter the path delays of security-critical registers. In contrast to system-wide countermeasures, we administer countermeasures locally to security-critical paths. As a result, these countermeasures incur minimal area and no latency overhead to the design. The framework's efficacy is shown by accounting for the DFA attack on the pipelined implementation of an AES design.
引用
收藏
页码:134 / 139
页数:6
相关论文
empty
未找到相关数据