Title
Vulnerability of secured IoT memory against localized back side laser fault injection
Abstract
Devices aimed for the Internet of Things (loT) market are required to be both low cost and highly secured, as they are expected to be integrated in ordinary "things" while storing and processing sensitive information. In this paper we examine the vulnerabilities of a commercial secured IoT memory chip to precise and localized back-side laser fault injection. We explain the different steps needed in order to prepare the sample, and describe the laser fault injection setup. From the experiments we conclude that the chip relies mostly on physical countermeasures which renders obsolete in this kind of attack. Further more, the experiments stress the necessity for sophisticated Error Detecting Codes in order to efficiently protect the integrity of the sensitive information stored and processed in the chip.
Year
DOI
Venue
2017
10.1109/EST.2017.8090391
2017 Seventh International Conference on Emerging Security Technologies (EST)
Keywords
Field
DocType
localized back side laser fault injection,secured IoT memory chip,Internet of Things market,error detecting codes,information integrity,EEPROM chip,AES encryption
Semiconductor laser theory,Computer science,Chip,Laser,EPROM,Information sensitivity,Integrated circuit,Operating system,Fault injection,Vulnerability,Embedded system
Conference
ISBN
Citations 
PageRank 
978-1-5386-4019-7
0
0.34
References 
Authors
10
5
Name
Order
Citations
PageRank
David Zooker Zabib101.35
Maoz Vizentovski200.34
Alexander Fish312321.24
Osnat Keren410620.19
Yoav Weizman534.19