Skip to main content

Investigation of Parameters Influencing the Success of Optical Fault Attacks

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8352))

Included in the following conference series:

Abstract

Fault attacks are a very powerful class of attacks targeting cryptographic primitives implemented on e.g., microcontrollers. These attacks are used to uncover some secret information by analysing the results of faulty computations. The faulty computations can be caused by intentional irradiation of parts of the chip with a laser beam. In order to succeed in inducing faults with a laser beam a reliable optical fault-injection environment is required and several parameters need to be chosen carefully. The main goal of this work is to show how to set up a reliable optical fault-injection environment. Therefore we examine the influence of laser beams on different microcontroller platforms in detail. We have performed several experiments like single and multiple fault injections in SRAM registers from the front side and the rear side of the chip using different laser sources. Furthermore several parameters influencing the success in order to induce optical faults are examined in detail and an approach to find laser-sensitive spots on the chip is presented. This approach increases the efficiency of optical fault attacks significantly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ajluni, C.: Two new imaging techniques promise to improve IC defect identification. Electronic Des. 43(14), 37–38 (1995)

    Google Scholar 

  2. Anderson, R.J., Kuhn, M.G.: Tamper resistance - a cautionary note. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, Oakland, California, November 18–21, pp. 1–11. USENIX Association, November 1996. ISBN 1-880446-83-9

    Google Scholar 

  3. Anderson, R.J., Kuhn, M.G.: Low cost attacks on tamper resistant devices. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  4. Atmel Corporation. ATmega 162/v Datasheet (2003)

    Google Scholar 

  5. Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer’s apprentice guide to fault attacks. Cryptology ePrint Archive. http://eprint.iacr.org/, Report 2004/100 (2004)

  6. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)

    Google Scholar 

  7. Li, H.: Refractive index of silicon and germanium and its wavelength and temperature derivatives. ICON 5, 9 (1979)

    Google Scholar 

  8. Microchip Technology Inc. PIC16F84 Data Sheet (2001)

    Google Scholar 

  9. Schmidt, J.-M., Hutter, M.: Optical and EM fault-attacks on CRT-based RSA: concrete results. In: Posch, K.C., Wolkerstorfer, J. (eds.) Proceedings of Austrochip 2007, October 11, Graz, Austria, pp. 61–67. Verlag der Technischen Universität Graz, October 2007. ISBN 978-3-902465-87-0

    Google Scholar 

  10. Schmidt, J.-M., Hutter, M., Plos, T.: Optical fault attacks on AES: a threat in violet. In: Naccache, D., Oswald, E. (eds.) Fault Diagnosis and Tolerance in Cryptography, Procceedings of Sixth International Workshop, FDTC 2009, Lausanne, Switzerland, 6 September, pp. 13–22. IEEE-CS Press, (2009)

    Google Scholar 

  11. Skorobogatov, S.: Optical fault masking attacks. In: Fault Diagnosis and Tolerance in Cryptography (2010)

    Google Scholar 

  12. Skorobogatov, S.P.: Semi-invasive attacks - a new approach to hardware security analysis. Ph.D. thesis, University of Cambridge - Computer Laboratory (2005). http://www.cl.cam.ac.uk/TechReports/

  13. Skorobogatov, S.Y.: Optically enhanced position-locked power analysis. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 61–75. Springer, Heidelberg (2006)

    Google Scholar 

  14. Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski Jr, B.S., Koç, Ç., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2–12. Springer, Heidelberg (2003)

    Google Scholar 

  15. Trichina, E.: Multi-fault laser attacks on protected CRT RSA. Invited Talk - FDTC 2010 (2010)

    Google Scholar 

Download references

Acknowledgments

The work presented in this article has been supported by the European Commission through the ICT program TAMPRES (Tamper Resistant Sensor Node) under contract ICT-SEC-2009-5-258754.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Korak .

Editor information

Editors and Affiliations

Appendix

Appendix

Figures  12 and 13 depict the influence of several parameters on the ability to induce faults on the PIC 16F84 from the front side and from the rear side, respectively.

Fig. 12.
figure 12

Influence of the parameters (laser pulse length, laser power, z coordinate) on the ability to induce a fault at a specific position at the front side of the PIC 16F84.

Fig. 13.
figure 13

Influence of the parameters (laser pulse length, laser power, z coordinate) on the ability to induce a fault at a specific position at the rear side of the PIC 16F84.

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Korak, T. (2014). Investigation of Parameters Influencing the Success of Optical Fault Attacks. In: Danger, J., Debbabi, M., Marion, JY., Garcia-Alfaro, J., Zincir Heywood, N. (eds) Foundations and Practice of Security. FPS 2013. Lecture Notes in Computer Science(), vol 8352. Springer, Cham. https://doi.org/10.1007/978-3-319-05302-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05302-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05301-1

  • Online ISBN: 978-3-319-05302-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics