{"title":"Fault Injection Caused by Phase-Locked Loop Compromised With IEMI","authors":"Hikaru Nishiyama;Daisuke Fujimoto;Yuichi Hayashi","doi":"10.1109/TEMC.2024.3468337","DOIUrl":null,"url":null,"abstract":"Intentional electromagnetic interference (IEMI) based fault injection is a hardware security threat that noninvasively generates temporary faults by causing a glitch in the clock supplied to a cryptographic module. Previous discussions of this threat have assumed that the glitch is supplied directly to the cryptographic module and that modules with clocks supplied by a phase-locked loop (PLL) are immune to this threat. However, for PLLs in general-purpose devices, which are required to output a stable clock frequency over a wide frequency bandwidth, a glitch may cause steep frequency fluctuations in the output clock. If these fluctuations exceed the maximum operating frequency of the module, a fault due to a timing violation caused by a PLL compromised with IEMI will occur. This article investigates the possibility of IEMI fault injection in cryptographic modules operated by a clock output from PLLs with wide-loop bandwidths implemented in general-purpose devices. Specifically, we focus on the phase comparison of the clock by the PLL and inject EM waves to temporarily increase the output clock frequency by controlling the occurrence time of the clock glitch. In experiments, we applied IEMI fault injection to a PLL implemented in a field-programmable gate array and demonstrated that it is possible to cause a fault due to a timing violation, leading to the extraction of the secret key. In addition, as a countermeasure against this threat, a method to suppress PLL output frequency fluctuations due to glitches was investigated.","PeriodicalId":55012,"journal":{"name":"IEEE Transactions on Electromagnetic Compatibility","volume":"67 2","pages":"538-544"},"PeriodicalIF":2.5000,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10704788","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Electromagnetic Compatibility","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10704788/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Intentional electromagnetic interference (IEMI) based fault injection is a hardware security threat that noninvasively generates temporary faults by causing a glitch in the clock supplied to a cryptographic module. Previous discussions of this threat have assumed that the glitch is supplied directly to the cryptographic module and that modules with clocks supplied by a phase-locked loop (PLL) are immune to this threat. However, for PLLs in general-purpose devices, which are required to output a stable clock frequency over a wide frequency bandwidth, a glitch may cause steep frequency fluctuations in the output clock. If these fluctuations exceed the maximum operating frequency of the module, a fault due to a timing violation caused by a PLL compromised with IEMI will occur. This article investigates the possibility of IEMI fault injection in cryptographic modules operated by a clock output from PLLs with wide-loop bandwidths implemented in general-purpose devices. Specifically, we focus on the phase comparison of the clock by the PLL and inject EM waves to temporarily increase the output clock frequency by controlling the occurrence time of the clock glitch. In experiments, we applied IEMI fault injection to a PLL implemented in a field-programmable gate array and demonstrated that it is possible to cause a fault due to a timing violation, leading to the extraction of the secret key. In addition, as a countermeasure against this threat, a method to suppress PLL output frequency fluctuations due to glitches was investigated.
期刊介绍:
IEEE Transactions on Electromagnetic Compatibility publishes original and significant contributions related to all disciplines of electromagnetic compatibility (EMC) and relevant methods to predict, assess and prevent electromagnetic interference (EMI) and increase device/product immunity. The scope of the publication includes, but is not limited to Electromagnetic Environments; Interference Control; EMC and EMI Modeling; High Power Electromagnetics; EMC Standards, Methods of EMC Measurements; Computational Electromagnetics and Signal and Power Integrity, as applied or directly related to Electromagnetic Compatibility problems; Transmission Lines; Electrostatic Discharge and Lightning Effects; EMC in Wireless and Optical Technologies; EMC in Printed Circuit Board and System Design.