JTAG Fault Injection Attack

Fault injection attacks are wide spread in the domain of smart cards and microcontrollers but have not been yet democratized on complex embedded microprocessors, such as system on chip that can be found in smart phones, tablets, and automotive systems. The main explanation is the difficulty involved...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE embedded systems letters 2018-09, Vol.10 (3), p.65-68
Hauptverfasser: Majeric, F., Gonzalvo, B., Bossuet, L.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 68
container_issue 3
container_start_page 65
container_title IEEE embedded systems letters
container_volume 10
creator Majeric, F.
Gonzalvo, B.
Bossuet, L.
description Fault injection attacks are wide spread in the domain of smart cards and microcontrollers but have not been yet democratized on complex embedded microprocessors, such as system on chip that can be found in smart phones, tablets, and automotive systems. The main explanation is the difficulty involved in injecting a fault at the right place and at the right time to make these attacks effective on such devices. However, for development and debugging, these devices provide new tools that could be considered as possibly enabling attacks. One of them, the JTAG debug tool is present on most electronic devices today. In this letter, we present the first fault injection attack based on JTAG. Using the example of a privilege escalation attack, we detail how this tool can be used either to check the feasibility of this attack by fault injection or to perform an actual attack.
doi_str_mv 10.1109/LES.2017.2771206
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_LES_2017_2771206</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8100880</ieee_id><sourcerecordid>2117147457</sourcerecordid><originalsourceid>FETCH-LOGICAL-c325t-65d40dacd8849a5f32214052afa50db05144db2cef35257c74b757bb759724c33</originalsourceid><addsrcrecordid>eNo9kM1Lw0AQxRdRsNTehV4KnjykzuzuZJJjKP2SgAfredlsNphYm5qkgv-9KSmdw8ww_N5jeEI8IswRIX5Jl-9zCchzyYwSwhsxwlirAELG2-seqnsxadsK-iLNpGgkpq-7ZD1b2dO-m20PlXddWR9mSddZ9_Ug7gq7b_3kMsfiY7XcLTZB-rbeLpI0cEpSF4SUa8ity6NIx5YKJSVqIGkLS5BnQKh1nknnC0WS2LHOmDjrW8xSO6XG4nnw_bR7c2zKb9v8mdqWZpOk5nwDDJWMmX6xZ58G9tjUPyffdqaqT82hf89IREbNmrinYKBcU7dt44urLYI5J2b6xMw5MXNJrJdMB0npvb_iEQJEEah_FBph9A</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2117147457</pqid></control><display><type>article</type><title>JTAG Fault Injection Attack</title><source>IEEE Electronic Library (IEL)</source><creator>Majeric, F. ; Gonzalvo, B. ; Bossuet, L.</creator><creatorcontrib>Majeric, F. ; Gonzalvo, B. ; Bossuet, L.</creatorcontrib><description>Fault injection attacks are wide spread in the domain of smart cards and microcontrollers but have not been yet democratized on complex embedded microprocessors, such as system on chip that can be found in smart phones, tablets, and automotive systems. The main explanation is the difficulty involved in injecting a fault at the right place and at the right time to make these attacks effective on such devices. However, for development and debugging, these devices provide new tools that could be considered as possibly enabling attacks. One of them, the JTAG debug tool is present on most electronic devices today. In this letter, we present the first fault injection attack based on JTAG. Using the example of a privilege escalation attack, we detail how this tool can be used either to check the feasibility of this attack by fault injection or to perform an actual attack.</description><identifier>ISSN: 1943-0663</identifier><identifier>EISSN: 1943-0671</identifier><identifier>DOI: 10.1109/LES.2017.2771206</identifier><identifier>CODEN: ESLMAP</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Computer security ; Debugging ; Electronic devices ; Electronics ; Embedded systems ; Engineering Sciences ; Fault injection attack ; JTAG ; Microcontrollers ; Microprocessors ; Smart cards ; Smartphones ; Software tools ; System on chip ; system on chip (SoC) ; Tablet computers</subject><ispartof>IEEE embedded systems letters, 2018-09, Vol.10 (3), p.65-68</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c325t-65d40dacd8849a5f32214052afa50db05144db2cef35257c74b757bb759724c33</citedby><cites>FETCH-LOGICAL-c325t-65d40dacd8849a5f32214052afa50db05144db2cef35257c74b757bb759724c33</cites><orcidid>0000-0003-4590-5674 ; 0000-0001-7964-3137</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8100880$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,780,784,796,885,27923,27924,54757</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8100880$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://hal.science/hal-01632975$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Majeric, F.</creatorcontrib><creatorcontrib>Gonzalvo, B.</creatorcontrib><creatorcontrib>Bossuet, L.</creatorcontrib><title>JTAG Fault Injection Attack</title><title>IEEE embedded systems letters</title><addtitle>LES</addtitle><description>Fault injection attacks are wide spread in the domain of smart cards and microcontrollers but have not been yet democratized on complex embedded microprocessors, such as system on chip that can be found in smart phones, tablets, and automotive systems. The main explanation is the difficulty involved in injecting a fault at the right place and at the right time to make these attacks effective on such devices. However, for development and debugging, these devices provide new tools that could be considered as possibly enabling attacks. One of them, the JTAG debug tool is present on most electronic devices today. In this letter, we present the first fault injection attack based on JTAG. Using the example of a privilege escalation attack, we detail how this tool can be used either to check the feasibility of this attack by fault injection or to perform an actual attack.</description><subject>Computer security</subject><subject>Debugging</subject><subject>Electronic devices</subject><subject>Electronics</subject><subject>Embedded systems</subject><subject>Engineering Sciences</subject><subject>Fault injection attack</subject><subject>JTAG</subject><subject>Microcontrollers</subject><subject>Microprocessors</subject><subject>Smart cards</subject><subject>Smartphones</subject><subject>Software tools</subject><subject>System on chip</subject><subject>system on chip (SoC)</subject><subject>Tablet computers</subject><issn>1943-0663</issn><issn>1943-0671</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kM1Lw0AQxRdRsNTehV4KnjykzuzuZJJjKP2SgAfredlsNphYm5qkgv-9KSmdw8ww_N5jeEI8IswRIX5Jl-9zCchzyYwSwhsxwlirAELG2-seqnsxadsK-iLNpGgkpq-7ZD1b2dO-m20PlXddWR9mSddZ9_Ug7gq7b_3kMsfiY7XcLTZB-rbeLpI0cEpSF4SUa8ity6NIx5YKJSVqIGkLS5BnQKh1nknnC0WS2LHOmDjrW8xSO6XG4nnw_bR7c2zKb9v8mdqWZpOk5nwDDJWMmX6xZ58G9tjUPyffdqaqT82hf89IREbNmrinYKBcU7dt44urLYI5J2b6xMw5MXNJrJdMB0npvb_iEQJEEah_FBph9A</recordid><startdate>20180901</startdate><enddate>20180901</enddate><creator>Majeric, F.</creator><creator>Gonzalvo, B.</creator><creator>Bossuet, L.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><general>Institute of Electrical and Electronics Engineers</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>1XC</scope><orcidid>https://orcid.org/0000-0003-4590-5674</orcidid><orcidid>https://orcid.org/0000-0001-7964-3137</orcidid></search><sort><creationdate>20180901</creationdate><title>JTAG Fault Injection Attack</title><author>Majeric, F. ; Gonzalvo, B. ; Bossuet, L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c325t-65d40dacd8849a5f32214052afa50db05144db2cef35257c74b757bb759724c33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer security</topic><topic>Debugging</topic><topic>Electronic devices</topic><topic>Electronics</topic><topic>Embedded systems</topic><topic>Engineering Sciences</topic><topic>Fault injection attack</topic><topic>JTAG</topic><topic>Microcontrollers</topic><topic>Microprocessors</topic><topic>Smart cards</topic><topic>Smartphones</topic><topic>Software tools</topic><topic>System on chip</topic><topic>system on chip (SoC)</topic><topic>Tablet computers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Majeric, F.</creatorcontrib><creatorcontrib>Gonzalvo, B.</creatorcontrib><creatorcontrib>Bossuet, L.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Hyper Article en Ligne (HAL)</collection><jtitle>IEEE embedded systems letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Majeric, F.</au><au>Gonzalvo, B.</au><au>Bossuet, L.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>JTAG Fault Injection Attack</atitle><jtitle>IEEE embedded systems letters</jtitle><stitle>LES</stitle><date>2018-09-01</date><risdate>2018</risdate><volume>10</volume><issue>3</issue><spage>65</spage><epage>68</epage><pages>65-68</pages><issn>1943-0663</issn><eissn>1943-0671</eissn><coden>ESLMAP</coden><abstract>Fault injection attacks are wide spread in the domain of smart cards and microcontrollers but have not been yet democratized on complex embedded microprocessors, such as system on chip that can be found in smart phones, tablets, and automotive systems. The main explanation is the difficulty involved in injecting a fault at the right place and at the right time to make these attacks effective on such devices. However, for development and debugging, these devices provide new tools that could be considered as possibly enabling attacks. One of them, the JTAG debug tool is present on most electronic devices today. In this letter, we present the first fault injection attack based on JTAG. Using the example of a privilege escalation attack, we detail how this tool can be used either to check the feasibility of this attack by fault injection or to perform an actual attack.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/LES.2017.2771206</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0003-4590-5674</orcidid><orcidid>https://orcid.org/0000-0001-7964-3137</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1943-0663
ispartof IEEE embedded systems letters, 2018-09, Vol.10 (3), p.65-68
issn 1943-0663
1943-0671
language eng
recordid cdi_crossref_primary_10_1109_LES_2017_2771206
source IEEE Electronic Library (IEL)
subjects Computer security
Debugging
Electronic devices
Electronics
Embedded systems
Engineering Sciences
Fault injection attack
JTAG
Microcontrollers
Microprocessors
Smart cards
Smartphones
Software tools
System on chip
system on chip (SoC)
Tablet computers
title JTAG Fault Injection Attack
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T12%3A58%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=JTAG%20Fault%20Injection%20Attack&rft.jtitle=IEEE%20embedded%20systems%20letters&rft.au=Majeric,%20F.&rft.date=2018-09-01&rft.volume=10&rft.issue=3&rft.spage=65&rft.epage=68&rft.pages=65-68&rft.issn=1943-0663&rft.eissn=1943-0671&rft.coden=ESLMAP&rft_id=info:doi/10.1109/LES.2017.2771206&rft_dat=%3Cproquest_RIE%3E2117147457%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2117147457&rft_id=info:pmid/&rft_ieee_id=8100880&rfr_iscdi=true