Experimental analysis of the electromagnetic instruction skip fault model and consequences for software countermeasures

Microcontrollers storing valuable data or using security functions are vulnerable to fault injection attacks. Among the various types of faults, instruction skips induced at runtime proved to be effective against identification routines or encryption algorithms. Until recently, most research works a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Microelectronics and reliability 2021-06, Vol.121, p.114133, Article 114133
Hauptverfasser: Dutertre, Jean-Max, Menu, Alexandre, Potin, Olivier, Rigaud, Jean-Baptiste, Danger, Jean-Luc
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 114133
container_title Microelectronics and reliability
container_volume 121
creator Dutertre, Jean-Max
Menu, Alexandre
Potin, Olivier
Rigaud, Jean-Baptiste
Danger, Jean-Luc
description Microcontrollers storing valuable data or using security functions are vulnerable to fault injection attacks. Among the various types of faults, instruction skips induced at runtime proved to be effective against identification routines or encryption algorithms. Until recently, most research works assessed a fault model that consists in a single instruction skip, i.e. the ability to prevent one chosen instruction in a program from being executed. We question this fault model for EM fault injection on experimental basis and report the possibility to induce several consecutive instructions skips. Such an extended fault model proved to be effective against a duplication-based software countermeasure as our experiments revealed.
doi_str_mv 10.1016/j.microrel.2021.114133
format Article
fullrecord <record><control><sourceid>hal_cross</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_03360628v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0026271421000998</els_id><sourcerecordid>oai_HAL_hal_03360628v1</sourcerecordid><originalsourceid>FETCH-LOGICAL-c394t-7373b8b790ca24f21e67de64ed0eebb638c24d98857c3015f1b4da471545b71d3</originalsourceid><addsrcrecordid>eNqFkE1LxDAQhoMouH78BcnVQ9dMkm26N0X8ggUvCt5Cmkw1a9usSerHv7dl1aungZn3eWEeQk6AzYFBebaed97GELGdc8ZhDiBBiB0yg0rxYinhaZfMGONlwRXIfXKQ0poxphjAjHxcfW4w-g77bFpqetN-JZ9oaGh-QYot2hxDZ557zN5S36ccB5t96Gl69RvamKHNtAsOJ9hRG_qEbwP2FhNtQqQpNPnDRBwvQ58xdmjSEDEdkb3GtAmPf-Yheby-eri8LVb3N3eXF6vCiqXMhRJK1FWtlswaLhsOWCqHpUTHEOu6FJXl0i2raqGsYLBooJbOSAULuagVOHFITre9L6bVm_FRE790MF7fXqz0tGNClKzk1TuM2XKbHW2mFLH5A4DpSbVe61_VelKtt6pH8HwL4vjJu8eok_WTA-fjKFC74P-r-AYrwY4c</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Experimental analysis of the electromagnetic instruction skip fault model and consequences for software countermeasures</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Dutertre, Jean-Max ; Menu, Alexandre ; Potin, Olivier ; Rigaud, Jean-Baptiste ; Danger, Jean-Luc</creator><creatorcontrib>Dutertre, Jean-Max ; Menu, Alexandre ; Potin, Olivier ; Rigaud, Jean-Baptiste ; Danger, Jean-Luc</creatorcontrib><description>Microcontrollers storing valuable data or using security functions are vulnerable to fault injection attacks. Among the various types of faults, instruction skips induced at runtime proved to be effective against identification routines or encryption algorithms. Until recently, most research works assessed a fault model that consists in a single instruction skip, i.e. the ability to prevent one chosen instruction in a program from being executed. We question this fault model for EM fault injection on experimental basis and report the possibility to induce several consecutive instructions skips. Such an extended fault model proved to be effective against a duplication-based software countermeasure as our experiments revealed.</description><identifier>ISSN: 0026-2714</identifier><identifier>EISSN: 1872-941X</identifier><identifier>DOI: 10.1016/j.microrel.2021.114133</identifier><language>eng</language><publisher>Elsevier Ltd</publisher><subject>EM fault injection ; Engineering Sciences ; Fault model ; Hardware attacks ; Micro and nanotechnologies ; Microelectronics</subject><ispartof>Microelectronics and reliability, 2021-06, Vol.121, p.114133, Article 114133</ispartof><rights>2021 Elsevier Ltd</rights><rights>Distributed under a Creative Commons Attribution 4.0 International License</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c394t-7373b8b790ca24f21e67de64ed0eebb638c24d98857c3015f1b4da471545b71d3</citedby><cites>FETCH-LOGICAL-c394t-7373b8b790ca24f21e67de64ed0eebb638c24d98857c3015f1b4da471545b71d3</cites><orcidid>0000-0001-7394-5345 ; 0000-0001-5063-7964 ; 0000-0002-2251-7815</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0026271421000998$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>230,314,776,780,881,3537,27901,27902,65306</link.rule.ids><backlink>$$Uhttps://hal.science/hal-03360628$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Dutertre, Jean-Max</creatorcontrib><creatorcontrib>Menu, Alexandre</creatorcontrib><creatorcontrib>Potin, Olivier</creatorcontrib><creatorcontrib>Rigaud, Jean-Baptiste</creatorcontrib><creatorcontrib>Danger, Jean-Luc</creatorcontrib><title>Experimental analysis of the electromagnetic instruction skip fault model and consequences for software countermeasures</title><title>Microelectronics and reliability</title><description>Microcontrollers storing valuable data or using security functions are vulnerable to fault injection attacks. Among the various types of faults, instruction skips induced at runtime proved to be effective against identification routines or encryption algorithms. Until recently, most research works assessed a fault model that consists in a single instruction skip, i.e. the ability to prevent one chosen instruction in a program from being executed. We question this fault model for EM fault injection on experimental basis and report the possibility to induce several consecutive instructions skips. Such an extended fault model proved to be effective against a duplication-based software countermeasure as our experiments revealed.</description><subject>EM fault injection</subject><subject>Engineering Sciences</subject><subject>Fault model</subject><subject>Hardware attacks</subject><subject>Micro and nanotechnologies</subject><subject>Microelectronics</subject><issn>0026-2714</issn><issn>1872-941X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNqFkE1LxDAQhoMouH78BcnVQ9dMkm26N0X8ggUvCt5Cmkw1a9usSerHv7dl1aungZn3eWEeQk6AzYFBebaed97GELGdc8ZhDiBBiB0yg0rxYinhaZfMGONlwRXIfXKQ0poxphjAjHxcfW4w-g77bFpqetN-JZ9oaGh-QYot2hxDZ557zN5S36ccB5t96Gl69RvamKHNtAsOJ9hRG_qEbwP2FhNtQqQpNPnDRBwvQ58xdmjSEDEdkb3GtAmPf-Yheby-eri8LVb3N3eXF6vCiqXMhRJK1FWtlswaLhsOWCqHpUTHEOu6FJXl0i2raqGsYLBooJbOSAULuagVOHFITre9L6bVm_FRE790MF7fXqz0tGNClKzk1TuM2XKbHW2mFLH5A4DpSbVe61_VelKtt6pH8HwL4vjJu8eok_WTA-fjKFC74P-r-AYrwY4c</recordid><startdate>202106</startdate><enddate>202106</enddate><creator>Dutertre, Jean-Max</creator><creator>Menu, Alexandre</creator><creator>Potin, Olivier</creator><creator>Rigaud, Jean-Baptiste</creator><creator>Danger, Jean-Luc</creator><general>Elsevier Ltd</general><general>Elsevier</general><scope>AAYXX</scope><scope>CITATION</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0001-7394-5345</orcidid><orcidid>https://orcid.org/0000-0001-5063-7964</orcidid><orcidid>https://orcid.org/0000-0002-2251-7815</orcidid></search><sort><creationdate>202106</creationdate><title>Experimental analysis of the electromagnetic instruction skip fault model and consequences for software countermeasures</title><author>Dutertre, Jean-Max ; Menu, Alexandre ; Potin, Olivier ; Rigaud, Jean-Baptiste ; Danger, Jean-Luc</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c394t-7373b8b790ca24f21e67de64ed0eebb638c24d98857c3015f1b4da471545b71d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>EM fault injection</topic><topic>Engineering Sciences</topic><topic>Fault model</topic><topic>Hardware attacks</topic><topic>Micro and nanotechnologies</topic><topic>Microelectronics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Dutertre, Jean-Max</creatorcontrib><creatorcontrib>Menu, Alexandre</creatorcontrib><creatorcontrib>Potin, Olivier</creatorcontrib><creatorcontrib>Rigaud, Jean-Baptiste</creatorcontrib><creatorcontrib>Danger, Jean-Luc</creatorcontrib><collection>CrossRef</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection><jtitle>Microelectronics and reliability</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Dutertre, Jean-Max</au><au>Menu, Alexandre</au><au>Potin, Olivier</au><au>Rigaud, Jean-Baptiste</au><au>Danger, Jean-Luc</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Experimental analysis of the electromagnetic instruction skip fault model and consequences for software countermeasures</atitle><jtitle>Microelectronics and reliability</jtitle><date>2021-06</date><risdate>2021</risdate><volume>121</volume><spage>114133</spage><pages>114133-</pages><artnum>114133</artnum><issn>0026-2714</issn><eissn>1872-941X</eissn><abstract>Microcontrollers storing valuable data or using security functions are vulnerable to fault injection attacks. Among the various types of faults, instruction skips induced at runtime proved to be effective against identification routines or encryption algorithms. Until recently, most research works assessed a fault model that consists in a single instruction skip, i.e. the ability to prevent one chosen instruction in a program from being executed. We question this fault model for EM fault injection on experimental basis and report the possibility to induce several consecutive instructions skips. Such an extended fault model proved to be effective against a duplication-based software countermeasure as our experiments revealed.</abstract><pub>Elsevier Ltd</pub><doi>10.1016/j.microrel.2021.114133</doi><orcidid>https://orcid.org/0000-0001-7394-5345</orcidid><orcidid>https://orcid.org/0000-0001-5063-7964</orcidid><orcidid>https://orcid.org/0000-0002-2251-7815</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0026-2714
ispartof Microelectronics and reliability, 2021-06, Vol.121, p.114133, Article 114133
issn 0026-2714
1872-941X
language eng
recordid cdi_hal_primary_oai_HAL_hal_03360628v1
source Elsevier ScienceDirect Journals Complete
subjects EM fault injection
Engineering Sciences
Fault model
Hardware attacks
Micro and nanotechnologies
Microelectronics
title Experimental analysis of the electromagnetic instruction skip fault model and consequences for software countermeasures
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T06%3A49%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-hal_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Experimental%20analysis%20of%20the%20electromagnetic%20instruction%20skip%20fault%20model%20and%20consequences%20for%20software%20countermeasures&rft.jtitle=Microelectronics%20and%20reliability&rft.au=Dutertre,%20Jean-Max&rft.date=2021-06&rft.volume=121&rft.spage=114133&rft.pages=114133-&rft.artnum=114133&rft.issn=0026-2714&rft.eissn=1872-941X&rft_id=info:doi/10.1016/j.microrel.2021.114133&rft_dat=%3Chal_cross%3Eoai_HAL_hal_03360628v1%3C/hal_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_els_id=S0026271421000998&rfr_iscdi=true