Side channel attacks represent a prime threat to the security of modern digital electronic systems. Among the different attack strategies, exploiting the information leaked by the resiliency of the device to harsh working conditions has recently emerged as an exploitable mean to retrieve secret keys held in a secure device. In this chapter we will provide an introduction to the Fault Sensitivity Analysis (FSA) attack technique, together with a design time evaluation of it on two different AES S-Boxes designs. Since a critical point of performing an FSA based attack is to choose a proper model for the expected failure trend of the device, we will delineate two different approaches, one based on an a-priori modeling of it, while the other exploits an a-posteriori strategy.

Fault Sensitivity Analysis at Design Time

BARENGHI, ALESSANDRO;BREVEGLIERI, LUCA ODDONE;PALOMBA, ANDREA;PELOSI, GERARDO
2015

Abstract

Side channel attacks represent a prime threat to the security of modern digital electronic systems. Among the different attack strategies, exploiting the information leaked by the resiliency of the device to harsh working conditions has recently emerged as an exploitable mean to retrieve secret keys held in a secure device. In this chapter we will provide an introduction to the Fault Sensitivity Analysis (FSA) attack technique, together with a design time evaluation of it on two different AES S-Boxes designs. Since a critical point of performing an FSA based attack is to choose a proper model for the expected failure trend of the device, we will delineate two different approaches, one based on an a-priori modeling of it, while the other exploits an a-posteriori strategy.
Trusted Computing for Embedded Systems
9783319094199
9783319094205
File in questo prodotto:
File Dimensione Formato  
Barenghi2015_Chapter_FaultSensitivityAnalysisAtDesi.pdf

Accesso riservato

: Publisher’s version
Dimensione 565.6 kB
Formato Adobe PDF
565.6 kB Adobe PDF   Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/11311/825932
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? ND
social impact