Title | ||
---|---|---|
Vulnerability of secured IoT memory against localized back side laser fault injection |
Abstract | ||
---|---|---|
Devices aimed for the Internet of Things (loT) market are required to be both low cost and highly secured, as they are expected to be integrated in ordinary "things" while storing and processing sensitive information. In this paper we examine the vulnerabilities of a commercial secured IoT memory chip to precise and localized back-side laser fault injection. We explain the different steps needed in order to prepare the sample, and describe the laser fault injection setup. From the experiments we conclude that the chip relies mostly on physical countermeasures which renders obsolete in this kind of attack. Further more, the experiments stress the necessity for sophisticated Error Detecting Codes in order to efficiently protect the integrity of the sensitive information stored and processed in the chip. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/EST.2017.8090391 | 2017 Seventh International Conference on Emerging Security Technologies (EST) |
Keywords | Field | DocType |
localized back side laser fault injection,secured IoT memory chip,Internet of Things market,error detecting codes,information integrity,EEPROM chip,AES encryption | Semiconductor laser theory,Computer science,Chip,Laser,EPROM,Information sensitivity,Integrated circuit,Operating system,Fault injection,Vulnerability,Embedded system | Conference |
ISBN | Citations | PageRank |
978-1-5386-4019-7 | 0 | 0.34 |
References | Authors | |
10 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
David Zooker Zabib | 1 | 0 | 1.35 |
Maoz Vizentovski | 2 | 0 | 0.34 |
Alexander Fish | 3 | 123 | 21.24 |
Osnat Keren | 4 | 106 | 20.19 |
Yoav Weizman | 5 | 3 | 4.19 |