When failure analysis meets side-channel attacks

  • Authors:
  • Jerome Di-Battista;Jean-Christophe Courrege;Bruno Rouzeyre;Lionel Torres;Philippe Perdu

  • Affiliations:
  • Thales ITSEF, Toulouse, France and Université de Montpellier, Laboratoire du LIRMM, Montpellier Cedex 5, France;Thales ITSEF, Toulouse, France;Université de Montpellier, Laboratoire du LIRMM, Montpellier Cedex 5, France;Université de Montpellier, Laboratoire du LIRMM, Montpellier Cedex 5, France;Centre National d'Etudes Spatiales, Toulouse, France

  • Venue:
  • CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The purpose of failure analysis is to locate the source of a defect in order to characterize it, using different techniques (laser stimulation, light emission, electromagnetic emission...). Moreover, the aim of vulnerability analysis, and particularly side-channel analysis, is to observe and collect various leakages information of an integrated circuit (power consumption, electromagnetic emission ...) in order to extract sensitive data. Although these two activities appear to be distincted, they have in common the observation and extraction of information about a circuit behavior. The purpose of this paper is to explain how and why these activities should be combined. Firstly it is shown that the leakage due to the light emitted during normal operation of a CMOS circuit can be used to set up an attack based on the DPA/DEMA technique. Then a second method based on laser stimulation is presented, improving the "traditional" attacks by injecting a photocurrent, which results in a punctual increase of the power consumption of a circuit. These techniques are demonstrated on an FPGA device.