Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/104642
Title: Automatic characterization of exploitable faults : a machine learning approach
Authors: Dasgupta, Pallab
Saha, Sayandeep
Jap, Dirmanto
Patranabis, Sikhar
Mukhopadhyay, Debdeep
Bhasin, Shivam
Keywords: DRNTU::Engineering::Electrical and electronic engineering
Security
Block Cipher
Issue Date: 2019
Source: Saha, S., Jap, D., Patranabis, S., Mukhopadhyay, D., Bhasin, S., & Dasgupta, P. (2019). Automatic characterization of exploitable faults : a machine learning approach. IEEE Transactions on Information Forensics and Security, 14(4), 954-968. doi:10.1109/TIFS.2018.2868245
Series/Report no.: IEEE Transactions on Information Forensics and Security
Abstract: Characterizing the fault space of a cipher to filter out a set of faults potentially exploitable for fault attacks (FA), is a problem with immense practical value. A quantitative knowledge of the exploitable fault space is desirable in several applications, like security evaluation, cipher construction and implementation, design, and testing of countermeasures etc. In this work, we investigate this problem in the context of block ciphers. The formidable size of the fault space of a block cipher mandates the use of an automation strategy to solve this problem, which should be able to characterize each individual fault instance quickly. On the other hand, the automation strategy is expected to be applicable to most of the block cipher constructions. Existing techniques for automated fault attacks do not satisfy both of these goals simultaneously and hence are not directly applicable in the context of exploitable fault characterization. In this paper, we present a supervised machine learning (ML) assisted automated framework, which successfully addresses both of the criteria mentioned. The key idea is to extrapolate the knowledge of some existing FAs on a cipher to rapidly figure out new attack instances. Experimental validation of this idea on two state-of-the-art block ciphers – PRESENT and LED, establishes that our approach is able to provide fairly good accuracy in identifying exploitable fault instances at a reasonable cost. Utilizing this observation, we propose a statistical framework for exploitable fault space characterization, which can provide an estimate of the success rate of an attacker corresponding to a given fault model and fault location. The framework also returns test vectors leading towards successful attacks. As a potential application, the effect of different S-Boxes on the fault space of a cipher is evaluated utilizing the framework.
URI: https://hdl.handle.net/10356/104642
http://hdl.handle.net/10220/48070
ISSN: 1556-6013
DOI: 10.1109/TIFS.2018.2868245
Schools: School of Physical and Mathematical Sciences 
Organisations: Physical Analysis & Cryptographic Engineering (PACE) Labs
Research Centres: Temasek Laboratories 
Rights: © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TIFS.2018.2868245
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SPMS Journal Articles
TL Journal Articles

Files in This Item:
File Description SizeFormat 
TIFS_Exploitable_ML_ver_11_26_05_2018_minor_review_draft.pdf1.11 MBAdobe PDFThumbnail
View/Open

SCOPUSTM   
Citations 20

15
Updated on Mar 16, 2025

Web of ScienceTM
Citations 20

10
Updated on Oct 24, 2023

Page view(s) 50

483
Updated on Mar 22, 2025

Download(s) 20

264
Updated on Mar 22, 2025

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.