Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit
Cryptographic integrated circuits (ICs) used to implement cryptographic algorithms have been widely applied to numerous security-critical environments nowadays. Fault injection is a powerful attack method on the cryptographic ICs, which will lead to the disclosure of secret information. Therefore, s...
Gespeichert in:
Veröffentlicht in: | Journal of cryptographic engineering 2024-04, Vol.14 (1), p.57-70 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 70 |
---|---|
container_issue | 1 |
container_start_page | 57 |
container_title | Journal of cryptographic engineering |
container_volume | 14 |
creator | Shao, Cuiping Zhao, Dongyan Li, Huiyun Cheng, Song Gao, Shunxian Yang, Liuqing |
description | Cryptographic integrated circuits (ICs) used to implement cryptographic algorithms have been widely applied to numerous security-critical environments nowadays. Fault injection is a powerful attack method on the cryptographic ICs, which will lead to the disclosure of secret information. Therefore, security detection under fault injection attacks has become very important. However, the existing security testing methods rely on experience to roughly judge the security of the chip through brute force testing, and they can not comprehensively locate and identify the security vulnerabilities. In this paper, we propose a novel method to detect security vulnerabilities of cryptographic ICs against fault injection attacks in the form of a linear programming problem based on compressed sensing (CS) and basis pursuit. We first identify sensitive logic cells of cryptographic IC in the design stage and then apply the incoherent observation method of CS to detect the states of these sensitive logic cells under fault injection attacks. Finally, according to the observation results, the vulnerability of these sensitive logic cells under fault injection attacks can be solved through linear programming. Thus, the security vulnerabilities are identified. Simulation results on a cryptographic IC demonstrate that the proposed method is capable to accurately identify the security vulnerabilities with negligible hardware overhead and is robust to noise interference. The identification of the security vulnerabilities is of great importance to security reinforcement and security evaluation. |
doi_str_mv | 10.1007/s13389-023-00324-2 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3048742532</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3048742532</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-3cf17b62741b3a0088fbc589728be4afe669ec0f20fc02b12ff3869e9c0b90473</originalsourceid><addsrcrecordid>eNp9kMtOwzAQRSMEElXpD7CyxDowtpPGWaLyqlSJDawt27WLS-oEj4PUP-CzSWgFO1bzuveOdLLsksI1BahukHIu6hwYzwE4K3J2kk0YrSEXJZ2f_vYgzrMZotfAeQFlWfFJ9nVnkzXJt4G0jqA1ffRpTz77JtiotG988haJD8TEfZfaTVTdmzdkuUCiNsoHTMSpvkmDZHsMUikp845EK7RrMixMu-uixXFCG9CHDVFhPd49kq6P2Pt0kZ051aCdHes0e324f1k85avnx-XidpUbVkHKuXG00nNWFVRzBSCE06YUdcWEtoVydj6vrQHHwBlgmjLnuBhWtQFdQ1HxaXZ1yO1i-9FbTHLb9jEMLyWHQlQFKzkbVOygMrFFjNbJLvqdintJQY7Q5QG6HKDLH-hyNPGDCQdx2Nj4F_2P6xvKrIe0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3048742532</pqid></control><display><type>article</type><title>Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit</title><source>SpringerLink Journals - AutoHoldings</source><creator>Shao, Cuiping ; Zhao, Dongyan ; Li, Huiyun ; Cheng, Song ; Gao, Shunxian ; Yang, Liuqing</creator><creatorcontrib>Shao, Cuiping ; Zhao, Dongyan ; Li, Huiyun ; Cheng, Song ; Gao, Shunxian ; Yang, Liuqing</creatorcontrib><description>Cryptographic integrated circuits (ICs) used to implement cryptographic algorithms have been widely applied to numerous security-critical environments nowadays. Fault injection is a powerful attack method on the cryptographic ICs, which will lead to the disclosure of secret information. Therefore, security detection under fault injection attacks has become very important. However, the existing security testing methods rely on experience to roughly judge the security of the chip through brute force testing, and they can not comprehensively locate and identify the security vulnerabilities. In this paper, we propose a novel method to detect security vulnerabilities of cryptographic ICs against fault injection attacks in the form of a linear programming problem based on compressed sensing (CS) and basis pursuit. We first identify sensitive logic cells of cryptographic IC in the design stage and then apply the incoherent observation method of CS to detect the states of these sensitive logic cells under fault injection attacks. Finally, according to the observation results, the vulnerability of these sensitive logic cells under fault injection attacks can be solved through linear programming. Thus, the security vulnerabilities are identified. Simulation results on a cryptographic IC demonstrate that the proposed method is capable to accurately identify the security vulnerabilities with negligible hardware overhead and is robust to noise interference. The identification of the security vulnerabilities is of great importance to security reinforcement and security evaluation.</description><identifier>ISSN: 2190-8508</identifier><identifier>EISSN: 2190-8516</identifier><identifier>DOI: 10.1007/s13389-023-00324-2</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Circuits and Systems ; Communications Engineering ; Computer Communication Networks ; Computer Science ; Cryptography ; Cryptology ; Data Structures and Information Theory ; Integrated circuits ; Linear programming ; Logic ; Networks ; Operating Systems ; Regular Paper ; Security</subject><ispartof>Journal of cryptographic engineering, 2024-04, Vol.14 (1), p.57-70</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-3cf17b62741b3a0088fbc589728be4afe669ec0f20fc02b12ff3869e9c0b90473</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s13389-023-00324-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s13389-023-00324-2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Shao, Cuiping</creatorcontrib><creatorcontrib>Zhao, Dongyan</creatorcontrib><creatorcontrib>Li, Huiyun</creatorcontrib><creatorcontrib>Cheng, Song</creatorcontrib><creatorcontrib>Gao, Shunxian</creatorcontrib><creatorcontrib>Yang, Liuqing</creatorcontrib><title>Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit</title><title>Journal of cryptographic engineering</title><addtitle>J Cryptogr Eng</addtitle><description>Cryptographic integrated circuits (ICs) used to implement cryptographic algorithms have been widely applied to numerous security-critical environments nowadays. Fault injection is a powerful attack method on the cryptographic ICs, which will lead to the disclosure of secret information. Therefore, security detection under fault injection attacks has become very important. However, the existing security testing methods rely on experience to roughly judge the security of the chip through brute force testing, and they can not comprehensively locate and identify the security vulnerabilities. In this paper, we propose a novel method to detect security vulnerabilities of cryptographic ICs against fault injection attacks in the form of a linear programming problem based on compressed sensing (CS) and basis pursuit. We first identify sensitive logic cells of cryptographic IC in the design stage and then apply the incoherent observation method of CS to detect the states of these sensitive logic cells under fault injection attacks. Finally, according to the observation results, the vulnerability of these sensitive logic cells under fault injection attacks can be solved through linear programming. Thus, the security vulnerabilities are identified. Simulation results on a cryptographic IC demonstrate that the proposed method is capable to accurately identify the security vulnerabilities with negligible hardware overhead and is robust to noise interference. The identification of the security vulnerabilities is of great importance to security reinforcement and security evaluation.</description><subject>Algorithms</subject><subject>Circuits and Systems</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Cryptology</subject><subject>Data Structures and Information Theory</subject><subject>Integrated circuits</subject><subject>Linear programming</subject><subject>Logic</subject><subject>Networks</subject><subject>Operating Systems</subject><subject>Regular Paper</subject><subject>Security</subject><issn>2190-8508</issn><issn>2190-8516</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kMtOwzAQRSMEElXpD7CyxDowtpPGWaLyqlSJDawt27WLS-oEj4PUP-CzSWgFO1bzuveOdLLsksI1BahukHIu6hwYzwE4K3J2kk0YrSEXJZ2f_vYgzrMZotfAeQFlWfFJ9nVnkzXJt4G0jqA1ffRpTz77JtiotG988haJD8TEfZfaTVTdmzdkuUCiNsoHTMSpvkmDZHsMUikp845EK7RrMixMu-uixXFCG9CHDVFhPd49kq6P2Pt0kZ051aCdHes0e324f1k85avnx-XidpUbVkHKuXG00nNWFVRzBSCE06YUdcWEtoVydj6vrQHHwBlgmjLnuBhWtQFdQ1HxaXZ1yO1i-9FbTHLb9jEMLyWHQlQFKzkbVOygMrFFjNbJLvqdintJQY7Q5QG6HKDLH-hyNPGDCQdx2Nj4F_2P6xvKrIe0</recordid><startdate>20240401</startdate><enddate>20240401</enddate><creator>Shao, Cuiping</creator><creator>Zhao, Dongyan</creator><creator>Li, Huiyun</creator><creator>Cheng, Song</creator><creator>Gao, Shunxian</creator><creator>Yang, Liuqing</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20240401</creationdate><title>Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit</title><author>Shao, Cuiping ; Zhao, Dongyan ; Li, Huiyun ; Cheng, Song ; Gao, Shunxian ; Yang, Liuqing</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-3cf17b62741b3a0088fbc589728be4afe669ec0f20fc02b12ff3869e9c0b90473</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Circuits and Systems</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Cryptology</topic><topic>Data Structures and Information Theory</topic><topic>Integrated circuits</topic><topic>Linear programming</topic><topic>Logic</topic><topic>Networks</topic><topic>Operating Systems</topic><topic>Regular Paper</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shao, Cuiping</creatorcontrib><creatorcontrib>Zhao, Dongyan</creatorcontrib><creatorcontrib>Li, Huiyun</creatorcontrib><creatorcontrib>Cheng, Song</creatorcontrib><creatorcontrib>Gao, Shunxian</creatorcontrib><creatorcontrib>Yang, Liuqing</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of cryptographic engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shao, Cuiping</au><au>Zhao, Dongyan</au><au>Li, Huiyun</au><au>Cheng, Song</au><au>Gao, Shunxian</au><au>Yang, Liuqing</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit</atitle><jtitle>Journal of cryptographic engineering</jtitle><stitle>J Cryptogr Eng</stitle><date>2024-04-01</date><risdate>2024</risdate><volume>14</volume><issue>1</issue><spage>57</spage><epage>70</epage><pages>57-70</pages><issn>2190-8508</issn><eissn>2190-8516</eissn><abstract>Cryptographic integrated circuits (ICs) used to implement cryptographic algorithms have been widely applied to numerous security-critical environments nowadays. Fault injection is a powerful attack method on the cryptographic ICs, which will lead to the disclosure of secret information. Therefore, security detection under fault injection attacks has become very important. However, the existing security testing methods rely on experience to roughly judge the security of the chip through brute force testing, and they can not comprehensively locate and identify the security vulnerabilities. In this paper, we propose a novel method to detect security vulnerabilities of cryptographic ICs against fault injection attacks in the form of a linear programming problem based on compressed sensing (CS) and basis pursuit. We first identify sensitive logic cells of cryptographic IC in the design stage and then apply the incoherent observation method of CS to detect the states of these sensitive logic cells under fault injection attacks. Finally, according to the observation results, the vulnerability of these sensitive logic cells under fault injection attacks can be solved through linear programming. Thus, the security vulnerabilities are identified. Simulation results on a cryptographic IC demonstrate that the proposed method is capable to accurately identify the security vulnerabilities with negligible hardware overhead and is robust to noise interference. The identification of the security vulnerabilities is of great importance to security reinforcement and security evaluation.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s13389-023-00324-2</doi><tpages>14</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2190-8508 |
ispartof | Journal of cryptographic engineering, 2024-04, Vol.14 (1), p.57-70 |
issn | 2190-8508 2190-8516 |
language | eng |
recordid | cdi_proquest_journals_3048742532 |
source | SpringerLink Journals - AutoHoldings |
subjects | Algorithms Circuits and Systems Communications Engineering Computer Communication Networks Computer Science Cryptography Cryptology Data Structures and Information Theory Integrated circuits Linear programming Logic Networks Operating Systems Regular Paper Security |
title | Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T16%3A59%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detection%20of%20security%20vulnerabilities%20in%20cryptographic%20ICs%20against%20fault%20injection%20attacks%20based%20on%20compressed%20sensing%20and%20basis%20pursuit&rft.jtitle=Journal%20of%20cryptographic%20engineering&rft.au=Shao,%20Cuiping&rft.date=2024-04-01&rft.volume=14&rft.issue=1&rft.spage=57&rft.epage=70&rft.pages=57-70&rft.issn=2190-8508&rft.eissn=2190-8516&rft_id=info:doi/10.1007/s13389-023-00324-2&rft_dat=%3Cproquest_cross%3E3048742532%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3048742532&rft_id=info:pmid/&rfr_iscdi=true |