RNN-based Detection of Fault Attacks on RSA

Troya Cagil Köylü, Cezar Rodolfo Wedig Reinbrecht, Said Hamdioui, Mottaqiallah Taouil

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

176 Downloads (Pure)

Abstract

Physical fault injection attacks are becoming an important threat to computer systems, as fault injection equipment becomes more and more accessible. In this work, we propose a new strategy to detect fault attacks in cryptosystems. We use a recurrent neural network (RNN) to detect problems in the program flow caused by injected faults. Our neural network is trained using the instructions of non-faulty operations and therefore, it can protect against both current and future attacks. As a case study, we use two implementations of software RSA. To test the effectiveness of our detector, we propose a collection of fault injection models, where each model represents different types of faults in the instructions. Evaluation results show that we obtain a high detection accuracy in case injected faults lead to changes in the instruction flow and hence, making it difficult to steal secrete keys. Finally, we propose an efficient hardware implementation with only a 6% area overhead compared to a RISC-V processor.
Original languageEnglish
Title of host publication2020 IEEE International Symposium on Circuits and Systems (ISCAS)
Place of PublicationPiscataway
PublisherIEEE
Pages1-5
Number of pages5
ISBN (Electronic)978-1-7281-3320-1
ISBN (Print)978-1-7281-3321-8
DOIs
Publication statusPublished - 2020
EventISCAS 2020: IEEE International Symposium on Circuits and Systems - Sevilla, Spain
Duration: 10 Oct 202021 Oct 2020
https://iscas2020.org/

Conference

ConferenceISCAS 2020: IEEE International Symposium on Circuits and Systems
Abbreviated titleISCAS 2020
Country/TerritorySpain
CitySevilla
Period10/10/2021/10/20
Internet address

Bibliographical note

Accepted author manuscript

Fingerprint

Dive into the research topics of 'RNN-based Detection of Fault Attacks on RSA'. Together they form a unique fingerprint.

Cite this