The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks
The versatility and cost of embedded systems have made it ubiquitous. Such wide-application exposes an embedded system to a variety of physical threats like side-channel attacks (SCA) and fault attacks (FA). Recently, a couple of software encoding schemes were proposed as a protection against SCA....
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/80634 http://hdl.handle.net/10220/40896 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-80634 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-806342023-02-28T19:17:24Z The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks Breier, Jakub Jap, Dirmanto Bhasin, Shivam School of Physical and Mathematical Sciences 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) Encoding Software The versatility and cost of embedded systems have made it ubiquitous. Such wide-application exposes an embedded system to a variety of physical threats like side-channel attacks (SCA) and fault attacks (FA). Recently, a couple of software encoding schemes were proposed as a protection against SCA. These protection schemes are based on dual-rail precharge logic (DPL), previously shown resistant to both SCA and FA. In this paper, we analyze the previously proposed software encoding schemes against FA. Our results show that software encoding offers only limited resistance to FA. Finally, improvement to software-encoding schemes is improved. With this improvement, software encoding can serve as a common SCA and FA countermeasure with an exploitable fault probability as low as 0.0048. Accepted version 2016-07-07T07:24:59Z 2019-12-06T13:53:36Z 2016-07-07T07:24:59Z 2019-12-06T13:53:36Z 2016 2016 Conference Paper Breier, J., Jap, D., & Bhasin, S. (2016). The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks. 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 209-216. 193450 https://hdl.handle.net/10356/80634 http://hdl.handle.net/10220/40896 10.1109/HST.2016.7495584 193450 en © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://doi.ieeecomputersociety.org/10.1109/HST.2016.7495584]. 8 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Encoding Software |
spellingShingle |
Encoding Software Breier, Jakub Jap, Dirmanto Bhasin, Shivam The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks |
description |
The versatility and cost of embedded systems have made it ubiquitous. Such wide-application exposes an embedded system to a variety of physical threats like side-channel attacks
(SCA) and fault attacks (FA). Recently, a couple of software encoding schemes were proposed as a protection against SCA. These protection schemes are based on dual-rail precharge logic
(DPL), previously shown resistant to both SCA and FA. In this paper, we analyze the previously proposed software encoding schemes against FA. Our results show that software encoding
offers only limited resistance to FA. Finally, improvement to software-encoding schemes is improved. With this improvement, software encoding can serve as a common SCA and FA countermeasure with an exploitable fault probability as low as 0.0048. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Breier, Jakub Jap, Dirmanto Bhasin, Shivam |
format |
Conference or Workshop Item |
author |
Breier, Jakub Jap, Dirmanto Bhasin, Shivam |
author_sort |
Breier, Jakub |
title |
The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks |
title_short |
The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks |
title_full |
The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks |
title_fullStr |
The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks |
title_full_unstemmed |
The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks |
title_sort |
other side of the coin: analyzing software encoding schemes against fault injection attacks |
publishDate |
2016 |
url |
https://hdl.handle.net/10356/80634 http://hdl.handle.net/10220/40896 |
_version_ |
1759854539900452864 |