2011 Workshop on Fault Diagnosis and Tolerance in Cryptography 2011
DOI: 10.1109/fdtc.2011.13
|View full text |Cite
|
Sign up to set email alerts
|

The Fault Attack Jungle - A Classification Model to Guide You

Abstract: Abstract-For a secure hardware designer, the vast array of fault attacks and countermeasures looks like a jungle. This paper aims at providing a guide through this jungle and at helping a designer of secure embedded devices to protect a design in the most efficient way. We classify the existing fault attacks on implementations of cryptographic algorithms on embedded devices according to different criteria. By doing do, we expose possible security threats caused by fault attacks and propose different classes of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(48 citation statements)
references
References 48 publications
0
48
0
Order By: Relevance
“…The first fault attack against a cryptographic algorithm was presented in 1997 [37]. Since then, fault attacks have been applied against various cryptographic algorithms [174] and became a standard tool to facilitate cryptanalysis. The attack assumptions can be described in detailed fault models, which include the location and the timing of the fault, and the number and kind of faults.…”
Section: Fault Attacksmentioning
confidence: 99%
“…The first fault attack against a cryptographic algorithm was presented in 1997 [37]. Since then, fault attacks have been applied against various cryptographic algorithms [174] and became a standard tool to facilitate cryptanalysis. The attack assumptions can be described in detailed fault models, which include the location and the timing of the fault, and the number and kind of faults.…”
Section: Fault Attacksmentioning
confidence: 99%
“…Countermeasures are necessarily designed with respect to a fault model specifying the type of faults an attacker is able to carry out [27]. Elaborating a fault model requires analysis of the consequences of physical attacks and modeling them at the desired level (architectural level, assembly code level, source code level).…”
Section: Fault Modelsmentioning
confidence: 99%
“…Also, they allow a finer study of protections since they are closer to the final code running on the chip and thus to the effect of a physical attack. Protections are designed with respect to a fault model describing a set of effects a fault can have at a certain level of abstraction [13]. For example, two well-known fault models that describe a fault at a logical level are Single Event Upset (SEU) and Multiple Event Upset (MEU).…”
Section: Many Countermeasuresmentioning
confidence: 99%