Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 26 von 122
Blind Side-Channel SIFA
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021, p.555-560
2021
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
Blind Side-Channel SIFA
Ist Teil von
  • 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2021, p.555-560
Ort / Verlag
EDAA
Erscheinungsjahr
2021
Quelle
IEEE Electronic Library Online
Beschreibungen/Notizen
  • Statistical Ineffective Fault Attacks (SIFA) have been recently proposed as very powerful key-recovery strategies on symmetric cryptographic primitives' implementations. Specifically, they have been shown to bypass many common countermeasures against faults such as redundancy or infection, and to remain applicable even when side-channel countermeasures are deployed. In this work, we investigate combined side-channel and fault attacks and show that a profiled, SIFA-like attack can be applied despite not having any direct ciphertext knowledge. The proposed attack exploits the ciphertext's side-channel and fault characteristics to mount successful key recoveries, even in the presence of masking and duplication countermeasures. We analyze the attack using simulations, discuss its requirements, strengths and limitations, and compare different approaches to distinguish the correct key. Finally, we demonstrate its applicability on an ARM Cortex-M4 device, utilizing a combination of laser-based fault injection and microprobe-based EM side-channel analysis.
Sprache
Englisch
Identifikatoren
eISSN: 1558-1101
DOI: 10.23919/DATE51398.2021.9474245
Titel-ID: cdi_ieee_primary_9474245

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX