Abstract | ||
---|---|---|
Fault attacks have been widely studied in the past but most of the literature describes only individual fault-injection techniques such as power/clock glitches, EM pulses, optical inductions, or heating/cooling. In this work, we investigate combined fault attacks by performing clock-glitch attacks under the impact of heating. We performed practical experiments on an 8-bit AVR microcontroller which resulted in the following findings. First, we identified that the success rate of glitch attacks performed at an ambient temperature of 100°C is higher than under room temperature. We were able to induce more faults and significantly increase the time frame when the device is susceptible to glitches which makes fault attacks easier to perform in practice. Second, and independently of the ambient temperature, we demonstrate that glitches cause individual instructions to repeat, we are able to add new random instructions, and we identified that opcode gets modified such that address registers of individual instructions get changed. Beside these new results, this is the first work that reports results of combined glitch and thermo attacks. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/FDTC.2014.20 | Fault Diagnosis and Tolerance in Cryptography |
Keywords | Field | DocType |
clocks,cryptography,microcontrollers,AVR microcontroller,EM pulses,clock glitch attacks,fault attacks,fault injection techniques,optical inductions,thermo attacks,ATmega,AVR,Fault attacks,glitches,heating,non-invasive,temperature | Glitch,Opcode,Time frame,Computer science,Field-programmable gate array,Real-time computing,Microcontroller,Embedded system | Conference |
Citations | PageRank | References |
8 | 0.66 | 16 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Thomas Korak | 1 | 71 | 7.32 |
Michael Hutter | 2 | 345 | 25.26 |
Baris Ege | 3 | 100 | 8.64 |
Lejla Batina | 4 | 1488 | 107.99 |