{"title":"硬件实现AES无人工触发的故障注入方法","authors":"HanSeop Lim, Taeho Lee, Seong-Yong Lim, Jaeseong Han, Bo-Yeon Sim, Dong‐Guk Han","doi":"10.1145/3440943.3444739","DOIUrl":null,"url":null,"abstract":"The theoretical process of fault injection attacks requires artificial triggering for target operation experimental easement. In real-world scenarios, artificial triggering depends on a powerful assumption, e.g., internal codes manipulating on the target device. Therefore, Lim et al. proposed a fault injection system that uses the I/O signals of target devices as a trigger to relax attacker assumptions. This system does not require the implementation of artificial triggering because input signals are used as a trigger in the transmission of plaintexts for fault injection attacks. The proposed fault injection system was applied in the experimental verification of an algorithm implemented in software; however, verification was not performed for a hardware-implemented algorithm. In this paper, we propose an eased triggering system that can also be used in hardware implemented algorithms. In the proposed system, Start/Done signals are used as a trigger. In addition, we propose an algorithm to analyze hardware-implemented AES, even if the fault injected range is widened.","PeriodicalId":310247,"journal":{"name":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Fault Injection Method for Hardware-implemented AES without Artificial Triggering\",\"authors\":\"HanSeop Lim, Taeho Lee, Seong-Yong Lim, Jaeseong Han, Bo-Yeon Sim, Dong‐Guk Han\",\"doi\":\"10.1145/3440943.3444739\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The theoretical process of fault injection attacks requires artificial triggering for target operation experimental easement. In real-world scenarios, artificial triggering depends on a powerful assumption, e.g., internal codes manipulating on the target device. Therefore, Lim et al. proposed a fault injection system that uses the I/O signals of target devices as a trigger to relax attacker assumptions. This system does not require the implementation of artificial triggering because input signals are used as a trigger in the transmission of plaintexts for fault injection attacks. The proposed fault injection system was applied in the experimental verification of an algorithm implemented in software; however, verification was not performed for a hardware-implemented algorithm. In this paper, we propose an eased triggering system that can also be used in hardware implemented algorithms. In the proposed system, Start/Done signals are used as a trigger. In addition, we propose an algorithm to analyze hardware-implemented AES, even if the fault injected range is widened.\",\"PeriodicalId\":310247,\"journal\":{\"name\":\"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3440943.3444739\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3440943.3444739","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fault Injection Method for Hardware-implemented AES without Artificial Triggering
The theoretical process of fault injection attacks requires artificial triggering for target operation experimental easement. In real-world scenarios, artificial triggering depends on a powerful assumption, e.g., internal codes manipulating on the target device. Therefore, Lim et al. proposed a fault injection system that uses the I/O signals of target devices as a trigger to relax attacker assumptions. This system does not require the implementation of artificial triggering because input signals are used as a trigger in the transmission of plaintexts for fault injection attacks. The proposed fault injection system was applied in the experimental verification of an algorithm implemented in software; however, verification was not performed for a hardware-implemented algorithm. In this paper, we propose an eased triggering system that can also be used in hardware implemented algorithms. In the proposed system, Start/Done signals are used as a trigger. In addition, we propose an algorithm to analyze hardware-implemented AES, even if the fault injected range is widened.