Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms

Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems int...

Full description

Saved in:
Bibliographic Details
Main Authors: Bhasin, Shivam, Mukhopadhyay, Debdeep
Other Authors: 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering
Format: Conference or Workshop Item
Language:English
Published: 2017
Subjects:
Online Access:https://hdl.handle.net/10356/82845
http://hdl.handle.net/10220/42605
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-82845
record_format dspace
spelling sg-ntu-dr.10356-828452020-09-26T22:15:53Z Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms Bhasin, Shivam Mukhopadhyay, Debdeep 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering Temasek Laboratories Differential fault analysis Fault injection attacks Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical nature. This tutorial addresses this issue of fault attacks, covering a wide range of topics which has accumulated through years of research. The first part of the talk will cover fault attacks and its application to attack standard cryptosystems. Different popular forms of fault attacks, namely Differential Fault Attacks (DFA) and Differential Fault Intensity Attacks (DFIA) are presented. It is followed subsequently by a discussion on the underlying injection techniques. Finally, protection mechanism will be discussed highlighting on information redundancy based reactive countermeasures and sensor-based protection mechanisms as two alternative strategies for security against the menacing fault attacks. Accepted version 2017-06-07T06:01:37Z 2019-12-06T15:06:45Z 2017-06-07T06:01:37Z 2019-12-06T15:06:45Z 2016-12-01 2016 Conference Paper Bhasin, S., & Mukhopadhyay, D. (2016). Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms. 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering, 415-418. https://hdl.handle.net/10356/82845 http://hdl.handle.net/10220/42605 10.1007/978-3-319-49445-6_24 199333 en © 2016 Springer International Publishing AG. This is the author created version of a work that has been peer reviewed and accepted for publication by 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering, Springer International Publishing AG. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://doi.org/10.1007/978-3-319-49445-6_24]. 4 p. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Differential fault analysis
Fault injection attacks
spellingShingle Differential fault analysis
Fault injection attacks
Bhasin, Shivam
Mukhopadhyay, Debdeep
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
description Fault Injection Attacks are a powerful form of active attack mechanism which can threaten even the strongest of cryptographic algorithms. This attack vector has become more pertinent with the growing popularity of the Internet of things (IoT), which is based on small omnipresent embedded systems interacting with sensitive data of personal or critical nature. This tutorial addresses this issue of fault attacks, covering a wide range of topics which has accumulated through years of research. The first part of the talk will cover fault attacks and its application to attack standard cryptosystems. Different popular forms of fault attacks, namely Differential Fault Attacks (DFA) and Differential Fault Intensity Attacks (DFIA) are presented. It is followed subsequently by a discussion on the underlying injection techniques. Finally, protection mechanism will be discussed highlighting on information redundancy based reactive countermeasures and sensor-based protection mechanisms as two alternative strategies for security against the menacing fault attacks.
author2 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering
author_facet 2016 International Conference on Security, Privacy, and Applied Cryptography Engineering
Bhasin, Shivam
Mukhopadhyay, Debdeep
format Conference or Workshop Item
author Bhasin, Shivam
Mukhopadhyay, Debdeep
author_sort Bhasin, Shivam
title Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title_short Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title_full Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title_fullStr Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title_full_unstemmed Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms
title_sort fault injection attacks: attack methodologies, injection techniques and protection mechanisms
publishDate 2017
url https://hdl.handle.net/10356/82845
http://hdl.handle.net/10220/42605
_version_ 1681058463918063616