Abstract
Fault injection attacks pose an important threat to security-sensitive applications, such as secure communication and storage. By injecting faults into instructions, an attacker can cause information leakage or denial-of-service. Hence, it is important to secure the sensitive parts not only by detecting faults in the executed instructions but also by correcting them. In this work, we propose a hardware detection and correction module based on Hopfield networks. Our module is connected to the instruction buffer and validates all fetched instructions. In case faults are detected, faulty instructions are replaced by corrected ones. Experimental results on a small RISC-V processor and two RSA implementations show that we achieve near perfect detection and around 70% accurate correction with 9% area overhead. This correction rate is enough to secure some implementations for all considered attacks.
Original language | English |
---|---|
Title of host publication | 2022 IEEE 31st Asian Test Symposium (ATS) |
Publisher | IEEE |
Pages | 102-107 |
Number of pages | 6 |
ISBN (Electronic) | 978-1-6654-7227-2 |
ISBN (Print) | 978-1-6654-7228-9 |
DOIs | |
Publication status | Published - 2022 |
Event | 2022 IEEE 31st Asian Test Symposium - Taichung City, Taiwan Duration: 21 Nov 2022 → 23 Nov 2022 Conference number: 31 https://ats2022.ee.nthu.edu.tw |
Conference
Conference | 2022 IEEE 31st Asian Test Symposium |
---|---|
Abbreviated title | ATS |
Country/Territory | Taiwan |
City | Taichung City |
Period | 21/11/22 → 23/11/22 |
Internet address |
Bibliographical note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-careOtherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.