Advertisement

High-Level Simulation for Multiple Fault Injection Evaluation

  • Maxime Puys
  • Lionel Rivière
  • Julien Bringer
  • Thanh-ha Le
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8872)

Abstract

Faults injection attacks have become a hot topic in the domain of smartcards. This work exposes a source code-base simulation approach designed to evaluate the robustness of high-level secured implementations against single and multiple fault injections. In addition to an unprotected CRT-RSA implementation, we successfully attacked two countermeasures with the high-level simulation under the data fault model. We define a filtering criterion that operates on found attacks and we refine our simulation analysis accordingly. We introduce a broader fault model that consists in skipping C lines of code and exhibit benefits of such high-level fault model in term of simulation performance and attack coverage.

References

  1. 1.
    Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997) CrossRefGoogle Scholar
  2. 2.
    Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997) CrossRefGoogle Scholar
  3. 3.
    CSE, Scssi, BSI, Nlncsa, CESG, Nist, and NSA. Common Criteria 2. https://www.commoncriteriaportal.org
  4. 4.
    Quisquater, J.-J., Couvreur, C.: Fast decipherment algorithm for rsa public-key cryptosystem. Electron. Lett. 18(21), 905–907 (1982)CrossRefGoogle Scholar
  5. 5.
    Potet, M.-L., Mounier, L., Puys, M., Dureuil, L.: Lazart: a symbolic approach for evaluation the robustness of secured codes against control flow fault injection. In: ICST (2014)Google Scholar
  6. 6.
    Joye, M., Lenstra, A.K., Quisquater, J.-J.: Chinese remaindering based cryptosystems in the presence of faults. J. Cryptol. 12(4), 241–245 (1999)CrossRefzbMATHGoogle Scholar
  7. 7.
    Miani, R.-S., Cukier, M., Zarpelão, B.B., de Souza Mendes, L.: Relationships between information security metrics: an empirical study. In: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, CSIIRW 2013, pp. 22:1–22:4. ACM, New York (2013)Google Scholar
  8. 8.
    Vaughn, R.B., Henning, R.R., Siraj, A.: Information assurance measures and metrics - state of practice and proposed taxonomy. In: HICSS, p. 331 (2003)Google Scholar
  9. 9.
    Savola, R.: Towards a taxonomy for information security metrics. In: Karjoth, G., Stølen, K. (eds.) QoP, pp. 28–30. ACM (2007)Google Scholar
  10. 10.
    Jansen, W.: Directions in security metrics research. DIANE Publishing, NISTIR 7564 (2010)Google Scholar
  11. 11.
    Christofi, M.: Preuves de sécurité outillées d’implémentation cryptographiques. Ph.D. thesis, Laboratoire PRiSM, Université de Versailles Saint Quentin-en-Yvelines, France (2013)Google Scholar
  12. 12.
    Christofi, M., Chetali, B., Goubin, L., Vigilant, D.: Formal verification of a CRT-RSA implementation against fault attacks. J. Crypt. Eng. 3(3), 157–167 (2013)CrossRefGoogle Scholar
  13. 13.
    Rauzy, P., Guilley, S.: A formal proof of countermeasures against fault injection attacks on CRT-RSA, vol. 2013, pp. 506 (2013)Google Scholar
  14. 14.
    A. Shamir. Method and apparatus for protecting public key schemes from timing and fault attacks. Patent Number 5,991,415, November 1999 (Also presented at the rump session of EUROCRYPT 1997)Google Scholar
  15. 15.
    Aumüller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, pp. 260–275. Springer, Heidelberg (2002) Google Scholar
  16. 16.
    Rauzy, P., Guilley. S.: Formal analysis of CRT-RSA vigilant’s countermeasure against the bellcore attack: a pledge for formal methods in the field of implementation security. In: Jagannathan, S., Sewell, P. (eds.) PPREW@POPL, p. 2. ACM (2014)Google Scholar
  17. 17.
    Kauffmann-Tourkestansky, X.: Analyses securitaires de code de carte a puce sous attaques physiques simulees. Ph.D. thesis, Université d’Orléans (2012)Google Scholar
  18. 18.
    Heydemann, K., Moro, N., Encrenaz, E., Robisson, B., Formal verification of a software countermeasure against instruction skip attacks. In: PROOFS 2013, Aot, Santa-Barbara, États-Unis (2013)Google Scholar
  19. 19.
    ARM Architecture Reference Manual - Thumb-2 Supplement (2005)Google Scholar
  20. 20.
    Brayton, R.K., et al.: VIS: A system for verification and synthesis. In: Alur, R., Henzinger, T.A. (eds.) CAV 1996. LNCS, pp. 428–432. Springer, Heidelberg (1996) CrossRefGoogle Scholar
  21. 21.
    Berthier, M., Bringer, J., Chabanne, H., Le, T.-H., Rivière, L., Servant, V.: Idea: embedded fault injection simulator on smartcard. In: Jürjens, J., Piessens, F., Bielova, N. (eds.) ESSoS. LNCS, vol. 8364, pp. 222–229. Springer, Heidelberg (2014) CrossRefGoogle Scholar
  22. 22.
    The KLEE symbolic virtual machine. http://klee.llvm.org/
  23. 23.
    Vigilant, D.: RSA with CRT: a new cost-effective solution to thwart fault attacks. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 130–145. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  24. 24.
    Moro, N., Dehbaoui, A., Heydemann, K., Robisson, B., Encrenaz, E.: Electromagnetic fault injection: towards a fault model on a 32-bit microcontroller. In: FDTC, pp. 77–88. IEEE (2013)Google Scholar
  25. 25.
    Kosuri, V.K., Fazal, N.: FPGA modeling of fault-injection attacks on cryptographic devices. IJERA 3, 937–943 (2013)Google Scholar
  26. 26.
  27. 27.
    Kim, S.-K., Kim, T.H., Han, D.-G., Hong, S.: An efficient CRT-RSA algorithm secure against power and fault attacks. J. Syst. Softw. 84(10), 1660–1669 (2011)CrossRefGoogle Scholar
  28. 28.
    Dehbaoui, A., Mirbaha, A.-P., Moro, N., Dutertre, J.-M., Tria, A.: Electromagnetic glitch on the AES round counter. In: Prouff, E. (ed.) COSADE 2013. LNCS, vol. 7864, pp. 17–31. Springer, Heidelberg (2013) CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Maxime Puys
    • 1
  • Lionel Rivière
    • 1
    • 2
  • Julien Bringer
    • 1
  • Thanh-ha Le
    • 1
  1. 1.SAFRAN MorphoParisFrance
  2. 2.Télécom ParistechParisFrance

Personalised recommendations