{"title":"Fault Injection Method for Hardware-implemented AES without Artificial Triggering","authors":"HanSeop Lim, Taeho Lee, Seong-Yong Lim, Jaeseong Han, Bo-Yeon Sim, Dong‐Guk Han","doi":"10.1145/3440943.3444739","DOIUrl":null,"url":null,"abstract":"The theoretical process of fault injection attacks requires artificial triggering for target operation experimental easement. In real-world scenarios, artificial triggering depends on a powerful assumption, e.g., internal codes manipulating on the target device. Therefore, Lim et al. proposed a fault injection system that uses the I/O signals of target devices as a trigger to relax attacker assumptions. This system does not require the implementation of artificial triggering because input signals are used as a trigger in the transmission of plaintexts for fault injection attacks. The proposed fault injection system was applied in the experimental verification of an algorithm implemented in software; however, verification was not performed for a hardware-implemented algorithm. In this paper, we propose an eased triggering system that can also be used in hardware implemented algorithms. In the proposed system, Start/Done signals are used as a trigger. In addition, we propose an algorithm to analyze hardware-implemented AES, even if the fault injected range is widened.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3440943.3444739","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The theoretical process of fault injection attacks requires artificial triggering for target operation experimental easement. In real-world scenarios, artificial triggering depends on a powerful assumption, e.g., internal codes manipulating on the target device. Therefore, Lim et al. proposed a fault injection system that uses the I/O signals of target devices as a trigger to relax attacker assumptions. This system does not require the implementation of artificial triggering because input signals are used as a trigger in the transmission of plaintexts for fault injection attacks. The proposed fault injection system was applied in the experimental verification of an algorithm implemented in software; however, verification was not performed for a hardware-implemented algorithm. In this paper, we propose an eased triggering system that can also be used in hardware implemented algorithms. In the proposed system, Start/Done signals are used as a trigger. In addition, we propose an algorithm to analyze hardware-implemented AES, even if the fault injected range is widened.