当前位置: X-MOL 学术Microprocess. Microsyst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Experimental evaluation of RISC-V micro-architecture against fault injection attack
Microprocessors and Microsystems ( IF 2.6 ) Pub Date : 2023-12-20 , DOI: 10.1016/j.micpro.2023.104991
Maryam Esmaeilian , Hakem Beitollahi

Today, the use of embedded processors is increasing dramatically and they are used in all aspects from our daily life to security applications. Physical access to hardware has made the hardware security a major concern. Hardware attacks compromise the hardware security by physically accessing target devices. Among the available techniques for hardware attacks, Fault Injection Attacks (FIAs), such as clock glitching, are one of the most harmful types of non-invasive attacks that can disrupt the operation of an embedded system. Thus, it will be important and fundamental to evaluate embedded software programs before using them in critical applications and check their vulnerability against fault injection attacks. However, it is often difficult for software developers to assess vulnerabilities. In this paper, an easy-to-use platform is presented to facilitate the process of evaluating the vulnerability of programs running on embedded processors against clock glitching attacks. Our experimental results show the vulnerability window of RISC-V micro-architecture for different high-level C-functions. The results of this research can help the developers of embedded systems that are used in security applications to evaluate their system against clock glitching attacks with the least cost in a short time.



中文翻译:

RISC-V微架构抗故障注入攻击的实验评估

如今,嵌入式处理器的使用正在急剧增加,它们被应用于从日常生活到安全应用的各个方面。对硬件的物理访问使硬件安全成为主要问题。硬件攻击通过物理访问目标设备来损害硬件安全。在可用的硬件攻击技术中,故障注入攻击 (FIA)(例如时钟故障)是最有害的非侵入式攻击类型之一,可以破坏嵌入式系统的运行。因此,在关键应用程序中使用嵌入式软件程序之前对其进行评估并检查其针对故障注入攻击的脆弱性将是重要且基础的。然而,软件开发人员通常很难评估漏洞。本文提出了一个易于使用的平台,以方便评估嵌入式处理器上运行的程序针对时钟毛刺攻击的脆弱性。我们的实验结果显示了 RISC-V 微架构针对不同高级 C 函数的漏洞窗口。这项研究的结果可以帮助安全应用中使用的嵌入式系统的开发人员在短时间内以最低的成本评估其系统是否能够抵御时钟故障攻击。

更新日期:2023-12-20
down
wechat
bug