Countermeasures against fault attacks on software implemented AES: effectiveness and cost
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
An improved differential fault analysis on AES-256
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults
Proceedings of the 4th international conference on Security of information and networks
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Differential fault analysis of AES-128 key schedule using a single multi-byte fault
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Journal of Systems and Software
Secure multipliers resilient to strong fault-injection attacks using multilinear arithmetic codes
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Hi-index | 0.00 |
Fault injection attacks are a powerful tool to exploit implementative weaknessesof robust cryptographic algorithms. The faults induced during the computation of the cryptographic primitives allow to extract pieces of information about the secret parameters stored into the device using the erroneous results. Various fault induction techniques have been researched, both to make practical several theoretical fault models proposed in open literature and to outline new kinds of vulnerabilities. In this paper we describe a non-invasive fault model based on the effects of underfeeding the power supply of an ARM general purpose CPU. We describe the methodology followed to characterize the fault model on an ARM9 microprocessor and propose and mount attacks on implementations of the RSA primitives.