2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) 2020
DOI: 10.1109/fdtc51366.2020.00012
|View full text |Cite
|
Sign up to set email alerts
|

SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…Examples of the architectures and variations can be seen in published and available injection platforms. This includes platforms described in previous work such as [8], [9], [15], [16], [17].…”
Section: Drive Architecturesmentioning
confidence: 99%
See 1 more Smart Citation
“…Examples of the architectures and variations can be seen in published and available injection platforms. This includes platforms described in previous work such as [8], [9], [15], [16], [17].…”
Section: Drive Architecturesmentioning
confidence: 99%
“…The exploitation of the fault is not specific to EM faults, and many comprehensive backgrounds on this topic have been given [7], [28]. The objective of an attacker will vary widely, but realworld demonstrations have shown usage of EMFI to dump secrets from memory [22], bypass password checks in bootloaders [10], bypass code protection mechanisms in microcontrollers [15], and perform differential fault analysis [9], [17], [29]. The insertion of faults with EMFI can even be used to validate safety-critical systems [27].…”
Section: From Interference To Exploitationmentioning
confidence: 99%
“…Recently, there have been published several custom-made low-cost EMFI device prototypes which can be easily reproduced by using inexpensive off-the-shelf components and a moderate knowledge in electronics. BADFET [10] was shown to be capable of overcoming a secure boot, Silicon-Toaster [55] was used to defeat a firmware security protection of an IoT device, and another low-cost device was shown to be effective in privilege escalation [56].…”
Section: Electromagnetic Fault Injectionmentioning
confidence: 99%
“…Next to the intended corruption of data values, faults can be used to skip security checks, enter protected code paths, or gain code execution [4], [5]. During the past years, attacks against microcontrollers and SoCs using laser-based [6] and electromagnetic [7], [8] FI have been presented. While these techniques offer high accuracy in targeting a specific part of the chip, they also require comparatively sophisticated setups.…”
Section: Introductionmentioning
confidence: 99%