Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2897937.2898065acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

PLL to the rescue: a novel EM fault countermeasure

Published: 05 June 2016 Publication History

Abstract

Electromagnetic injection (EMI) is a powerful and precise technique for fault injection in modern ICs. This intentional fault can be utilized to steal secret information hidden inside of ICs. Unlike laser fault injection, tedious package decapsulation is not needed for EMI, which reduces an attacker's cost and thus causes a serious information security threat. In this paper, a PLL-based sensor circuit is proposed to detect EMI reactively on chip. A fully automatic design flow is devised to integrate the proposed sensor together with a cryptographic processor. A high fault detection coverage and a small hardware overhead are demonstrated experimentally on an FPGA platform.

References

[1]
S. Bhasin, J. Danger, S. Guilley, Z. Najm, and X. T. Ngo. Linear Complementary Dual Code Improvement to Strengthen Encoded Circuit Against Hardware Trojan Horses. In IEEE HOST 2015.
[2]
W. He, A. Otero, E. de la Torre, and T. Riesgo. Customized and automated routing repair toolset towards side-channel analysis resistant dual rail logic. Microprocessors and Microsystems, 38(8):899--910, 2014.
[3]
P. C. Kocher, J. Jaffe, and B. Jun. Differential power analysis. CRYPTO '99, pages 388--397, 1999.
[4]
C. Lavin, M. Padilla, P. Lundrigan, B. Nelson, and B. Hutchings. Rapid prototyping tools for fpga designs: Rapidsmith. In FPT'10, pages 353--356. IEEE, 2010.
[5]
Y. Li, K. Sakiyama, S. Gomisawa, T. Fukunaga, J. Takahashi, and K. Ohta. Fault Sensitivity Analysis. In CHES, volume 6225 of LNCS, pages 320--334. Springer, 2010. Santa Barbara, CA, USA.
[6]
N. Miura, D. Fujimoto, M. Nagata, N. Homma, Y. Hayashi, and T. Aoki. EM attack sensor: concept, circuit, and design-automation methodology. In Proceedings of the 52nd Annual Design Automation Conference, pages 176:1--176:6, 2015.
[7]
F. Poucheret, K. Tobich, M. Lisart, L. Chusseau, B. Robisson, and P. Maurine. Local and direct EM injection of power into CMOS integrated circuits. In Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011.
[8]
L. Zussa, A. Dehbaoui, K. Tobich, J. Dutertre, P. Maurine, L. Guillaume-Sage, J. Clédière, and A. Tria. Efficiency of a glitch detector against electromagnetic fault injection. In Design, Automation & Test in Europe Conference & Exhibition, DATE 2014, pages 1--6, 2014.

Cited By

View all
  • (2024)FTC: A Universal Framework for Fault-Injection Attack Detection and PreventionIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2024.338453132:7(1311-1324)Online publication date: Jul-2024
  • (2024)DELFINES: Detecting Laser Fault Injection Attacks via Digital SensorsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.332262343:3(774-787)Online publication date: Mar-2024
  • (2024)EM Fault Injection-Induced Clock Glitches: From Mechanism Analysis to Novel Sensor Design2024 IEEE 30th International Symposium on On-Line Testing and Robust System Design (IOLTS)10.1109/IOLTS60994.2024.10616074(1-7)Online publication date: 3-Jul-2024
  • Show More Cited By
  1. PLL to the rescue: a novel EM fault countermeasure

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    DAC '16: Proceedings of the 53rd Annual Design Automation Conference
    June 2016
    1048 pages
    ISBN:9781450342360
    DOI:10.1145/2897937
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 June 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. PLL
    2. countermeasure
    3. electromagnetic attacks
    4. fault attacks

    Qualifiers

    • Research-article

    Conference

    DAC '16

    Acceptance Rates

    Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)23
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 23 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)FTC: A Universal Framework for Fault-Injection Attack Detection and PreventionIEEE Transactions on Very Large Scale Integration (VLSI) Systems10.1109/TVLSI.2024.338453132:7(1311-1324)Online publication date: Jul-2024
    • (2024)DELFINES: Detecting Laser Fault Injection Attacks via Digital SensorsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.332262343:3(774-787)Online publication date: Mar-2024
    • (2024)EM Fault Injection-Induced Clock Glitches: From Mechanism Analysis to Novel Sensor Design2024 IEEE 30th International Symposium on On-Line Testing and Robust System Design (IOLTS)10.1109/IOLTS60994.2024.10616074(1-7)Online publication date: 3-Jul-2024
    • (2023)Oops..! i glitched it again!Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620586(6239-6256)Online publication date: 9-Aug-2023
    • (2023)Echo TEMPEST: EM Information Leakage Induced by IEMI for Electronic DevicesIEEE Transactions on Electromagnetic Compatibility10.1109/TEMC.2023.325263665:3(655-666)Online publication date: Jun-2023
    • (2023)(Adversarial) Electromagnetic Disturbance in the IndustryIEEE Transactions on Computers10.1109/TC.2022.322437372:2(414-422)Online publication date: 1-Feb-2023
    • (2023)Aggressive Design Reuse for Ubiquitous Zero-Trust Edge Security—From Physical Design to Machine-Learning-Based Hardware PatchingIEEE Open Journal of the Solid-State Circuits Society10.1109/OJSSCS.2022.32232743(1-16)Online publication date: 2023
    • (2023)Analog Techniques for Digital Security: My gratitudes to visionary discussionsIEEE Solid-State Circuits Magazine10.1109/MSSC.2022.321978015:1(25-31)Online publication date: Dec-2024
    • (2023)Design of RISC-V heterogeneous multi-core SOC architecture for edge computing for power applications2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference (ITNEC)10.1109/ITNEC56291.2023.10082372(701-708)Online publication date: 24-Feb-2023
    • (2023)Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55118.2023.10133494(13-23)Online publication date: 1-May-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media