Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3339252.3339253acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software Perspective

Published: 26 August 2019 Publication History

Abstract

In the area of physical attacks, system-on-chip (SoC) designs have not received the same level of attention as simpler micro-controllers. We try to model the behavior of secure software running on a superscalar out-of-order microprocessor typical of more complex SoC, in the presence of electromagnetic (EM) pulses. We first show that it is possible, in a black box approach, to corrupt the loop iteration count of both original and hardened versions of two sensitive loops. We propose a characterization methodology based on very simple codes, to understand and classify the fault effects at the level of the instruction set architecture (ISA). The resulting classification includes the well established instruction skip and register corruption models, as well as new effects specific to more complex processors, such as operand substitution, multiple correlated register corruptions, advanced control-flow hijacking, and combinations of all reported effects. This diversity and complexity of effects can lead to powerful attacks. The proposed methodology and fault classification at ISA level is a first step towards a more complete characterization. It is also a tool supporting the designers of software and hardware countermeasures.

References

[1]
C. Aumüller, P. Bier, P. Hofreiter, W. Fischer, and J.-P. Seifert. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. Cryptology ePrint Archive, Report 2002/073, 2002.
[2]
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan. The sorcerer's apprentice guide to fault attacks. Proceedings of the IEEE, 94(2):370--382, 2006.
[3]
T. Barry, D. Couroussé, and B. Robisson. Compilation of a countermeasure against instruction-skip fault attacks. In Workshop on Cryptography and Security in Computing Systems, CS2, 2016.
[4]
D. Boneh, R. A. DeMillo, and R. J. Lipton. On the importance of checking cryptographic protocols for faults. In W. Fumy, editor, Advances in Cryptology --- EUROCRYPT, pages 37--51. Springer, 1997.
[5]
E. Brier, D. Naccache, P. Q. Nguyen, and M. Tibouchi. Modulus fault attacks against rsa-crt signatures. Cryptology ePrint Archive, Report 2011/388, 2011.
[6]
Common Criteria. Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5.
[7]
R. De Keulenaer, J. Maebe, K. De Bosschere, and B. De Sutter. Linktime smart card code hardening. International Journal of Information Security, pages 1--20, 2015.
[8]
A. Dehbaoui, J. Dutertre, B. Robisson, P. Orsatelli, P. Maurine, and A. Tria. Injection of transient faults using electromagnetic pulses -- practical results on a cryptographic system. Cryptology ePrint Archive, Report 2012/123, 2012.
[9]
A. Dehbaoui, A. Mirbaha, N. Moro, J. Dutertre, and A. Tria. Electromagnetic glitch on the AES round counter. In COSADE, 2013.
[10]
L. Dureuil, G. Petiot, M. Potet, T. Le, A. Crohen, and P. de Choudens. FISSC: A fault injection and simulation secure collection. In SAFE-COMP, 2016.
[11]
L. Dureuil, M.-L. Potet, P. de Choudens, C. Dumas, and J. Clédière. From code review to fault injection attacks: Filling the gap using fault model inference. In Smart Card Research and Advanced Applications Conference (CARDIS), pages 107--124. Springer, 2016.
[12]
T. Espitau, P. Fouque, B. Gérard, and M. Tibouchi. Loop-abort faults on lattice-based signature schemes and key exchange protocols. IEEE Trans. Computers, 67(11):1535--1549, 2018.
[13]
M. S. Kelly, K. Mayes, and J. F. Walker. Characterising a cpu fault attack model via run-time data analysis. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 79--84, 2017.
[14]
J.-F. Lalande, K. Heydemann, and P. BerthomÃľ. Software Countermeasures for Control Flow Integrity of Smart Card C Codes. In Computer Security - ESORICS, volume 8713 of LNCS, pages 200--218. Springer, 2014.
[15]
F. Majéric, E. Bourbao, and L. Bossuet. Electromagnetic security tests for SoC. In IEEE International Conference on Electronics, Circuits and Systems (ICECS), pages 265--268, 2016.
[16]
N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz. Electromagnetic fault injection: Towards a fault model on a 32-bit microcontroller. In Workshop on Fault Diagnosis and Tolerance in Cryptography, pages 77--88, 2013.
[17]
S. Nashimoto, N. Homma, Y.-i. Hayashi, J. Takahashi, H. Fuji, and T. Aoki. Buffer overflow attack with multiple fault injection and a proven countermeasure. Journal of Cryptographic Engineering, 2016.
[18]
S. Ordas, L. Guillaume-Sage, and P. Maurine. EM injection: Fault model and locality. Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 3--13, 2015.
[19]
S. Ordas, L. Guillaume-Sage, K. Tobich, J.-M. Dutertre, and P. Maurine. Evidence of a larger em-induced fault model. In Smart Card Research and Advanced Applications (CARDIS), pages 245--259. Springer, 2015.
[20]
J. Proy, K. Heydemann, A. Berzati, and A. Cohen. Compiler-Assisted Loop Hardening Against Fault Attacks. ACM Transactions on Architecture and Code Optimization, 14(4):36, 2017.
[21]
G. Reis, J. Chang, N. Vachharajani, R. Rangan, and D. August. SWIFT: Software Implemented Fault Tolerance. In International Symposium on Code Generation and Optimization, pages 243--254, 2005.
[22]
L. Rivière, Z. Najm, P. Rauzy, J.-L. Danger, J. Bringer, and L. Sauvage. High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2015.
[23]
N. Timmers and C. Mune. Escalating privileges in linux using voltage fault injection. In Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 1--8, 2017.
[24]
N. Timmers, A. Spruyt, and M. Witteman. Controlling PC on ARM using fault injection. In Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 25--35, 2016.
[25]
A. Vasselle, H. Thiebeauld, Q. Maouhoub, A. Morisset, and S. Ermeneux. Laser-induced fault injection on smartphone bypassing the secure boot. In Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 41--48, 2017.
[26]
B. Weyl. Secure on-board architecture specification. EVITA project Deliverable D3.2, 2011.
[27]
B. Yuce, N. F. Ghalaty, H. Santapuri, C. Deshpande, C. Patrick, and P. Schaumont. Software fault resistance is futile: Effective single-glitch attacks. In Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 47--58, 2016.
[28]
B. Yuce, P. Schaumont, and M. Witteman. Fault attacks on secure embedded software: Threats, design, and evaluation. Journal of Hardware and Systems Security, 2(2):111--130, 2018.

Cited By

View all
  • (2024)Modeling Clock Glitch Fault Injection Effects on a RISC-V Microcontroller2024 IEEE 30th International Symposium on On-Line Testing and Robust System Design (IOLTS)10.1109/IOLTS60994.2024.10616064(1-3)Online publication date: 3-Jul-2024
  • (2024)PoP DRAM: A new EMFI approach based on EM-induced glitches on SoC2024 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)10.1109/FDTC64268.2024.00010(10-21)Online publication date: 4-Sep-2024
  • (2024)Inferred Fault Models for RISC-V and Arm: A Comparative Study2024 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)10.1109/DFT63277.2024.10753562(1-6)Online publication date: 8-Oct-2024
  • Show More Cited By

Index Terms

  1. A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software Perspective

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and Security
        August 2019
        979 pages
        ISBN:9781450371643
        DOI:10.1145/3339252
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 26 August 2019

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. countermeasures to physical attacks
        2. electromagnetic pulse injection
        3. fault models
        4. superscalar out-of-order

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ARES '19

        Acceptance Rates

        Overall Acceptance Rate 228 of 451 submissions, 51%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)17
        • Downloads (Last 6 weeks)4
        Reflects downloads up to 09 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Modeling Clock Glitch Fault Injection Effects on a RISC-V Microcontroller2024 IEEE 30th International Symposium on On-Line Testing and Robust System Design (IOLTS)10.1109/IOLTS60994.2024.10616064(1-3)Online publication date: 3-Jul-2024
        • (2024)PoP DRAM: A new EMFI approach based on EM-induced glitches on SoC2024 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)10.1109/FDTC64268.2024.00010(10-21)Online publication date: 4-Sep-2024
        • (2024)Inferred Fault Models for RISC-V and Arm: A Comparative Study2024 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)10.1109/DFT63277.2024.10753562(1-6)Online publication date: 8-Oct-2024
        • (2024)Cross-layer analysis of clock glitch fault injection while fetching variable-length instructionsJournal of Cryptographic Engineering10.1007/s13389-024-00352-614:2(325-342)Online publication date: 23-Apr-2024
        • (2024)Microarchitectural Insights into Unexplained Behaviors Under Clock Glitch Fault InjectionSmart Card Research and Advanced Applications10.1007/978-3-031-54409-5_1(3-22)Online publication date: 23-Feb-2024
        • (2023)Efficient Attack-Surface Exploration for Electromagnetic Fault InjectionConstructive Side-Channel Analysis and Secure Design10.1007/978-3-031-29497-6_2(23-41)Online publication date: 23-Mar-2023
        • (2023)SAMVA: Static Analysis for Multi-fault Attack Paths DeterminationConstructive Side-Channel Analysis and Secure Design10.1007/978-3-031-29497-6_1(3-22)Online publication date: 23-Mar-2023
        • (2023)CAD for Electromagnetic Fault InjectionCAD for Hardware Security10.1007/978-3-031-26896-0_8(169-185)Online publication date: 28-Jan-2023
        • (2022)Exploration of Fault Effects on Formal RISC-V Microarchitecture Models2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)10.1109/FDTC57191.2022.00017(73-83)Online publication date: Sep-2022
        • (2022)Variable-Length Instruction Set: Feature or Bug?2022 25th Euromicro Conference on Digital System Design (DSD)10.1109/DSD57027.2022.00068(464-471)Online publication date: Aug-2022
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media