Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA

Published: 01 April 2011 Publication History

Abstract

Programmable devices are an interesting alternative when implementing embedded systems on a low-volume scale. In particular, the affordability and the versatility of SRAM-based FPGAs make them attractive with respect to ASIC implementations. FPGAs have thus been used extensively and successfully in many fields, such as implementing cryptographic accelerators. Hardware implementations, however, must be protected against malicious attacks, e.g. those based on fault injections. Protections have been usually evaluated on ASICs, but FPGAs can be vulnerable as well. This work presents thus fault injection attacks against a secured AES architecture implemented on a SRAM-based FPGA. The errors are injected during the computation by means of voltage glitches and laser attacks. To our knowledge, this is one of the first works dealing with dynamic laser fault injections. We show that fault attacks on SRAM-based FPGAs may behave differently with respect to attacks against ASIC, and they need therefore to be addressed by specific countermeasures, that are also discussed in this paper. In addition, we discuss the different effects obtained by the two types of attacks.

Cited By

View all
  • (2024)FTC: A Universal Framework for Fault-Injection Attack Detection and PreventionIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2024.338453132:7(1311-1324)Online publication date: 1-Jul-2024
  • (2024)FLAT: Layout-Aware and Security Property-Assisted Timing Fault-Injection Attack AssessmentIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2024.337829132:6(1150-1163)Online publication date: 25-Mar-2024
  • (2024)Practical Improvements to Statistical Ineffective Fault AttacksConstructive Side-Channel Analysis and Secure Design10.1007/978-3-031-57543-3_4(59-75)Online publication date: 9-Apr-2024
  • Show More Cited By
  1. Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Journal of Cryptology
      Journal of Cryptology  Volume 24, Issue 2
      Special Issue on Hardware and Security
      April 2011
      181 pages

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 01 April 2011

      Author Tags

      1. DDR
      2. Laser fault injections
      3. Power glitch
      4. SRAM-based FPGA

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)FTC: A Universal Framework for Fault-Injection Attack Detection and PreventionIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2024.338453132:7(1311-1324)Online publication date: 1-Jul-2024
      • (2024)FLAT: Layout-Aware and Security Property-Assisted Timing Fault-Injection Attack AssessmentIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2024.337829132:6(1150-1163)Online publication date: 25-Mar-2024
      • (2024)Practical Improvements to Statistical Ineffective Fault AttacksConstructive Side-Channel Analysis and Secure Design10.1007/978-3-031-57543-3_4(59-75)Online publication date: 9-Apr-2024
      • (2023)Effective Layout Design for Laser Fault Sensor on FPGAProceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security10.1145/3605769.3623995(103-112)Online publication date: 30-Nov-2023
      • (2023)A Survey on FPGA Cybersecurity Design StrategiesACM Transactions on Reconfigurable Technology and Systems10.1145/356151516:2(1-33)Online publication date: 11-Mar-2023
      • (2023)Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep LearningJournal of Cryptology10.1007/s00145-023-09462-636:3Online publication date: 9-May-2023
      • (2022)Microarchitectural Attacks in Heterogeneous Systems: A SurveyACM Computing Surveys10.1145/354410255:7(1-40)Online publication date: 15-Dec-2022
      • (2022)Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous EraACM Computing Surveys10.1145/349833755:3(1-40)Online publication date: 3-Feb-2022
      • (2021)A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection MechanismsACM Transactions on Design Automation of Electronic Systems10.1145/347193627:1(1-35)Online publication date: 13-Sep-2021
      • (2020)Trust in FPGA-accelerated Cloud ComputingACM Computing Surveys10.1145/341910053:6(1-28)Online publication date: 6-Dec-2020
      • Show More Cited By

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media