Skip to main content

Fault Analysis Assisted by Simulation

  • Chapter
  • First Online:
Book cover Automated Methods in Cryptographic Fault Analysis

Abstract

Side-channel and fault injection attacks are renown techniques to extract keys from cryptographic devices. Fortunately, leakage reduction and fault detection countermeasures exist and can be implemented right in the source-code. However, source-code level countermeasures might be altered during the compilation process. Design simulation is an effective means to detect such harmful simplifications. This is a well-known methodology to analyze regressions in terms of side-channel leakage.

In this chapter, we explain that protections against fault injection attacks are no exception. First of all, we show that vulnerabilities to those attacks can be easily detected by simulation methods. Second, we highlight that simulation techniques are also highly efficient in detecting logic simplifications which destroy (fully or partly) the countermeasures. Thus, the simulation-based methodology we present in this chapter shows that it is possible to decide quickly which compilation options are safe and which ones are detrimental to the security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In Common Criteria parlance.

References

  1. N. Beringuier-Boher, M. Lacruche, D. El-Baze, J.-M. Dutertre, J.-B. Rigaud, P. Maurine, Body biasing injection attacks in practice, in Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC, Prague, January 20, 2016 (ACM, New York, 2016), pp. 49–54

    Google Scholar 

  2. G. Bertoni, L. Breveglieri, I. Koren, V. Piuri, Fault detection in the advanced encryption standard, in Proceedings of the Conference on Massively Parallel Computing Systems (MPCS’02) (2002), pp. 92–97

    Google Scholar 

  3. G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, V. Piuri, Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans. Comput. 52(4), 492–505 (2003)

    Article  Google Scholar 

  4. C. Giraud, DFA on AES, in 4th International Conference on Advanced Encryption Standard–AES, AES 2004, Bonn, May 10–12, 2004, Revised Selected and Invited Papers (Springer, Berlin, 2004), pp. 27–41

    Google Scholar 

  5. S. Guilley, J.-L. Danger, Global faults on cryptographic circuits, Chapter 17 in Fault Analysis in Cryptography, ed. by M. Joye, M. Tunstall, vol. 147 (Springer, Heidelberg, 2012)

    Google Scholar 

  6. M. Joye, M. Tunstall, Fault Analysis in Cryptography, vol. 147 (Springer, Heidelberg, 2012)

    Book  Google Scholar 

  7. R. Lashermes, G. Reymond, J.-M. Dutertre, J. Fournier, B. Robisson, A. Tria, A DFA on AES based on the entropy of error distributions, in 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, ed. by IEEE (IEEE, Piscataway, 2012), pp. 34–43

    Google Scholar 

  8. H. Li, A.T. Markettos, S.W. Moore, Security evaluation against electromagnetic analysis at design time, in Proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems–CHES 2005, Edinburgh, August 29–September 1, 2005 (Springer, Berlin, 2005), pp. 280–292

    Google Scholar 

  9. Secure-IC S.A.S. Virtualyzr ® tool. http://www.secure-ic.com/solutions/virtualyzr/. Accessed 2 Nov 2018

  10. N. Selmane, S. Guilley, J.-L. Danger, Setup time violation attacks on AES, in EDCC, The seventh European Dependable Computing Conference (IEEE, Piscataway, 2008), pp. 91–96, ISBN: 978-0-7695-3138-0. https://doi.org/10.1109/EDCC-7.2008.11

    Book  Google Scholar 

  11. S. Takarabt, K. Chibani, A. Facon, S. Guilley, Y. Mathieu, L. Sauvage, Y. Souissi, Pre-silicon embedded system evaluation as new EDA tool for security verification, in 3rd IEEE International Verification and Security Workshop, IVSW 2018, Costa Brava, July 2–4, 2018 (IEEE, Piscataway, 2018), pp. 74–79

    Google Scholar 

Download references

Acknowledgements

This work has benefited from a funding via TeamPlay (https://teamplay-h2020.eu/), a project from European Union’s Horizon2020 research and innovation programme, under grant agreement No. 779882. Besides, the French FUI program CSAFE+ also funded part of this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sylvain Guilley .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chibani, K. et al. (2019). Fault Analysis Assisted by Simulation. In: Breier, J., Hou, X., Bhasin, S. (eds) Automated Methods in Cryptographic Fault Analysis. Springer, Cham. https://doi.org/10.1007/978-3-030-11333-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-11333-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-11332-2

  • Online ISBN: 978-3-030-11333-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics