Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/152440
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBreier, Jakuben_US
dc.contributor.authorHou, Xiaoluen_US
dc.contributor.authorLiu, Yangen_US
dc.date.accessioned2021-08-13T07:28:42Z-
dc.date.available2021-08-13T07:28:42Z-
dc.date.copyright2018en
dc.date.issued2018-
dc.identifier.citationBreier, J., Hou, X. & Liu, Y. (2018). Fault attacks made easy : differential fault analysis automation on assembly code. IACR Transactions On Cryptographic Hardware and Embedded Systems, 2018(2), 96-122. https://dx.doi.org/10.13154/tches.v2018.i2.96-122en_US
dc.identifier.issn2569-2925en_US
dc.identifier.urihttps://hdl.handle.net/10356/152440-
dc.description.abstractOver the past decades, fault injection attacks have been extensively studied due to their capability to efficiently break cryptographic implementations. Fault injection attack models are normally determined by analyzing the cipher structure and finding exploitable spots in non-linear and permutation layers. However, this level of abstraction is often too high to distinguish vulnerable parts of software implementations, due to specific operations and optimizations. On the other hand, manually analyzing the assembly code requires non-negligible amount of time and expertise. In this paper, we propose an automated approach for analyzing cipher implementations in assembly. We represent the whole assembly program as a data flow graph so that the vulnerable spots can be found efficiently. Fault propagation is analyzed in a subgraph constructed from each vulnerable spot, allowing equations for Differential Fault Analysis (DFA) to be automatically generated. We have created a tool that implements our approach: DATAC – DFA Automation Tool for Assembly Code. We have successfully used this tool for attacking PRESENT80, being able to find implementation-specific vulnerabilities that can be exploited in order to recover the last round key with 16 faults. Our results show that DATAC is useful in finding attack spots that are not visible from the cipher structure, but can be easily exploited when dealing with real-world implementations.en_US
dc.description.sponsorshipNational Research Foundation (NRF)en_US
dc.language.isoenen_US
dc.relationNRF2014NCR-NCR001-3en_US
dc.relation.ispartofIACR Transactions on Cryptographic Hardware and Embedded Systemsen_US
dc.relation.ispartofseriesIACR Transactions on Cryptographic Hardware and Embedded Systemsen
dc.rights© 2018 Jakub Breier, Xiaolu Hou, Yang Liu. This work is licensed under a Creative Commons Attribution 4.0 International License.en_US
dc.subjectEngineering::Computer science and engineeringen_US
dc.titleFault attacks made easy : differential fault analysis automation on assembly codeen_US
dc.typeJournal Articleen
dc.contributor.schoolSchool of Computer Science and Engineeringen_US
dc.contributor.organizationTemasek Laboratoriesen_US
dc.identifier.doi10.13154/tches.v2018.i2.96-122-
dc.description.versionPublished versionen_US
dc.identifier.issue2en_US
dc.identifier.volume2018en_US
dc.identifier.spage96en_US
dc.identifier.epage122en_US
dc.subject.keywordsAutomated Fault Attacken_US
dc.subject.keywordsSoftware Implementationsen_US
dc.subject.keywordsAssembly Codeen_US
dc.identifier.rims206799en
dc.description.acknowledgementThis research is supported (in part) by the National Research Foundation, Prime Min-isters Office, Singapore under its National Cybersecurity R&D Program (Award No.NRF2014NCR-NCR001-30) and administered by the National Cybersecurity R&D Direc-torate.en_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:SCSE Journal Articles
Files in This Item:
File SizeFormat 
main.pdf682.22 kBAdobe PDFView/Open

SCOPUSTM   
Citations 20

12
Updated on Jul 10, 2022

Page view(s)

176
Updated on Aug 14, 2022

Download(s) 50

31
Updated on Aug 14, 2022

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.