Proceedings of the 1st ACM Workshop on Cyber-Physical System Security 2015
DOI: 10.1145/2732198.2732206
|View full text |Cite
|
Sign up to set email alerts
|

Laser Profiling for the Back-Side Fault Attacks

Abstract: Laser fault injection is one of the strongest fault injection techniques. It offers a precise area positioning and a precise timing, allowing a high repeatability of experiments.In our paper we examine possibilities of laser-induced faults that could lead to instruction skips. After the profiling phase we were able to perform an attack on the last AddRoundKey operation in AES and to retrieve the secret key with just one faulty and correct ciphertext pair. Our experiments show very high degree of repeatability … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…AES Attack by Breier et al [10] Performed experiments in this work show that a micro-controller running an AES algorithm is vulnerable to laser fault injection at the back side of the chip. The attack is described below.…”
Section: Laser Fault Attack Benchmarksmentioning
confidence: 80%
See 2 more Smart Citations
“…AES Attack by Breier et al [10] Performed experiments in this work show that a micro-controller running an AES algorithm is vulnerable to laser fault injection at the back side of the chip. The attack is described below.…”
Section: Laser Fault Attack Benchmarksmentioning
confidence: 80%
“…The sigmoid equation is shown in (10). Attackers can make the neural networks predict wrongly by skipping the negation instruction in the exponent function of the sigmoid function.…”
Section: Laser Fault Attack Benchmarksmentioning
confidence: 99%
See 1 more Smart Citation
“…. , p 7 ] gets reduced to an one byte value p ′ by xor-ing the individual address bytes as shown in Equation 6.…”
Section: The Linking Approachmentioning
confidence: 99%
“…Here, the attacker modifies the state of a computing device by, e.g., inducing glitches on the voltage supply or the clock signal [2] or by shooting with a laser on the chip [30]. Such a fault attack is capable of skipping instructions [6], redirecting the memory access [9], or flipping bits in registers or memory leading to a critical attack vector [11]. While this type of attack requires local access to the device to induce a fault, more advanced attacks can even induce faults remotely.…”
Section: Introductionmentioning
confidence: 99%