{"title":"Enhancing fault sensitivity analysis through templates","authors":"F. Melzani, A. Palomba","doi":"10.1109/HST.2013.6581560","DOIUrl":null,"url":null,"abstract":"This paper gives an assessment of the threats posed by Fault Sensitivity Analysis attacks. We propose an overall discussion of the possibilities in attacking a hardware implementation of AES. The limitations of the current methodology are presented, together with new approaches that allow for more effective attacks. Utilizing gate level simulations, a comparison is performed of the performances of different variations of the attack methodology on different AES implementations. We also introduce the application of template attacks to the Fault Sensitivity Analysis. Results indicate that the use of templates helps to overcome some of the limitations of the original attack.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"40 1","pages":"25-28"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2013.6581560","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
This paper gives an assessment of the threats posed by Fault Sensitivity Analysis attacks. We propose an overall discussion of the possibilities in attacking a hardware implementation of AES. The limitations of the current methodology are presented, together with new approaches that allow for more effective attacks. Utilizing gate level simulations, a comparison is performed of the performances of different variations of the attack methodology on different AES implementations. We also introduce the application of template attacks to the Fault Sensitivity Analysis. Results indicate that the use of templates helps to overcome some of the limitations of the original attack.