Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems int...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/82845 http://hdl.handle.net/10220/42605 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-82845 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-828452020-09-26T22:15:53Z Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms Bhasin, Shivam Mukhopadhyay, Debdeep 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering Temasek Laboratories Differential fault analysis Fault injection attacks Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical nature. This tutorial addresses this issue of fault attacks, covering a wide range of topics which has accumulated through years of research. The first part of the talk will cover fault attacks and its application to attack standard cryptosystems. Different popular forms of fault attacks, namely Differential Fault Attacks (DFA) and Differential Fault Intensity Attacks (DFIA) are presented. It is followed subsequently by a discussion on the underlying injection techniques. Finally, protection mechanism will be discussed highlighting on information redundancy based reactive countermeasures and sensor-based protection mechanisms as two alternative strategies for security against the menacing fault attacks. Accepted version 2017-06-07T06:01:37Z 2019-12-06T15:06:45Z 2017-06-07T06:01:37Z 2019-12-06T15:06:45Z 2016-12-01 2016 Conference Paper Bhasin, S., & Mukhopadhyay, D. (2016). Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms. 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering, 415-418. https://hdl.handle.net/10356/82845 http://hdl.handle.net/10220/42605 10.1007/978-3-319-49445-6_24 199333 en © 2016 Springer International Publishing AG. This is the author created version of a work that has been peer reviewed and accepted for publication by 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering, Springer International Publishing AG. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://doi.org/10.1007/978-3-319-49445-6_24]. 4 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
Differential fault analysis Fault injection attacks |
spellingShingle |
Differential fault analysis Fault injection attacks Bhasin, Shivam Mukhopadhyay, Debdeep Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms |
description |
Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical nature. This tutorial addresses this issue of fault attacks, covering a wide range of topics which has accumulated through years of research. The first part of the talk will cover fault attacks and its application to attack standard cryptosystems. Different popular forms of fault attacks, namely Differential Fault Attacks (DFA) and Differential Fault Intensity Attacks (DFIA) are presented. It is followed subsequently by a discussion on the underlying injection techniques. Finally, protection mechanism will be discussed highlighting on information redundancy based reactive countermeasures and sensor-based protection mechanisms as two alternative strategies for security against the menacing fault attacks. |
author2 |
2016 International Conference on Security, Privacy, and Applied Cryptography Engineering |
author_facet |
2016 International Conference on Security, Privacy, and Applied Cryptography Engineering Bhasin, Shivam Mukhopadhyay, Debdeep |
format |
Conference or Workshop Item |
author |
Bhasin, Shivam Mukhopadhyay, Debdeep |
author_sort |
Bhasin, Shivam |
title |
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms |
title_short |
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms |
title_full |
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms |
title_fullStr |
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms |
title_full_unstemmed |
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms |
title_sort |
fault injection attacks: attack methodologies, injection techniques and protection mechanisms |
publishDate |
2017 |
url |
https://hdl.handle.net/10356/82845 http://hdl.handle.net/10220/42605 |
_version_ |
1681058463918063616 |