2020 IEEE International Workshop on Information Forensics and Security (WIFS) 2020
DOI: 10.1109/wifs49906.2020.9360902
|View full text |Cite
|
Sign up to set email alerts
|

Electromagnetic Fault Injection as a New Forensic Approach for SoCs

Abstract: Smartphones have a complex hardware and software architecture. Having access to their full memory space can help solve judicial investigations. We propose a new privilege escalation technique in order to access hidden contents and execute sensitive operations. While classical forensic tools mostly exploit software vulnerabilities, it is based on a hardware security evaluation technique. Electromagnetic fault injection is such a technique usually used for microcontrollers or FPGA security characterization. A se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 6 publications
0
13
1
Order By: Relevance
“…The reader might wonder why the best success rate is only 0.62% experimentally while the theoretical success rate of the attack is around 50% as seen in Remark 3. This is due to the low repeatability of electromagnetic fault injection [10]: a lot of attempts at altering the algorithm's execution does not induce faults, or at least not in a way that enables us to perform the attack (e.g. a reboot).…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The reader might wonder why the best success rate is only 0.62% experimentally while the theoretical success rate of the attack is around 50% as seen in Remark 3. This is due to the low repeatability of electromagnetic fault injection [10]: a lot of attempts at altering the algorithm's execution does not induce faults, or at least not in a way that enables us to perform the attack (e.g. a reboot).…”
Section: Resultsmentioning
confidence: 99%
“…Before performing real-life electromagnetic fault attacks, we decided to simulate these attacks using software only. Indeed, fault injection attacks are long and complex to carry out [10], thus we chose to validate the attack with a simulation before the laboratory experiments. There were two steps: rst, we used Sagemath [26] to simulate fault injection and to recover the secret isogeny with an implementation of Algorithm 2 and then we emulated the target in C and injected the fault by debugging, while recovering the secret with the same Sage implementation of Algorithm 2.…”
Section: Sike Sike Is a Key Encapsulation Mechanism (Kem)mentioning
confidence: 99%
See 2 more Smart Citations
“…The drawback of this computational power is a complex hardware layout which is, for now, lacking security analysis, in particular, regarding hardware attacks. However, some recent works have demonstrated that these attacks are efficient to lower the security of modern SoCs [5], [11], [12], [13]. Therefore, we believe it is important to understand the underlying effect induced by the proposed perturbations to be able to measure their impact and design adapted countermeasures.…”
Section: Introductionmentioning
confidence: 99%