Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet

WESS '14 Pub Date : 2014-10-12 DOI:10.1145/2668322.2668323
Anju P. Johnson, Sayandeep Saha, R. Chakraborty, Debdeep Mukhopadhyay, Sezer Gören
{"title":"Fault attack on AES via hardware Trojan insertion by dynamic partial reconfiguration of FPGA over ethernet","authors":"Anju P. Johnson, Sayandeep Saha, R. Chakraborty, Debdeep Mukhopadhyay, Sezer Gören","doi":"10.1145/2668322.2668323","DOIUrl":null,"url":null,"abstract":"We describe a novel methodology to exploit the widely used Dynamic Partial Reconfiguration (DPR) support in Field Programmable Gate Arrays (FPGAs) to implant a hardware Trojan in an Advanced Encryption Standard (AES) encryption circuit implemented on a FPGA. The DPR is performed by transferring the required partial configuration bitstream file over an Ethernet connection to the FPGA board, from an attacker's computer which can communicate with the FPGA over a network. The inserted Trojan launches a \"fault attack\" on the AES encryption circuit, which enables recovery of the secret key by standard mathematical analysis of the faulty ciphertext produced. To the best of our knowledge, this is the first reported attack which exploits DPR to break an AES hardware implementation on FPGA. Our implementation results establish this to be an extremely potent attack on AES at low hardware and computational overhead, while using the standard unlicensed FPGA design tools.","PeriodicalId":434126,"journal":{"name":"WESS '14","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"32","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"WESS '14","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2668322.2668323","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 32

Abstract

We describe a novel methodology to exploit the widely used Dynamic Partial Reconfiguration (DPR) support in Field Programmable Gate Arrays (FPGAs) to implant a hardware Trojan in an Advanced Encryption Standard (AES) encryption circuit implemented on a FPGA. The DPR is performed by transferring the required partial configuration bitstream file over an Ethernet connection to the FPGA board, from an attacker's computer which can communicate with the FPGA over a network. The inserted Trojan launches a "fault attack" on the AES encryption circuit, which enables recovery of the secret key by standard mathematical analysis of the faulty ciphertext produced. To the best of our knowledge, this is the first reported attack which exploits DPR to break an AES hardware implementation on FPGA. Our implementation results establish this to be an extremely potent attack on AES at low hardware and computational overhead, while using the standard unlicensed FPGA design tools.
利用FPGA在以太网上的动态部分重构,通过硬件木马插入对AES进行故障攻击
我们描述了一种新的方法,利用现场可编程门阵列(FPGA)中广泛使用的动态部分重构(DPR)支持,在FPGA上实现的高级加密标准(AES)加密电路中植入硬件木马。DPR是通过将所需的部分配置比特流文件通过以太网连接传输到FPGA板来执行的,攻击者的计算机可以通过网络与FPGA通信。插入的木马对AES加密电路发起“故障攻击”,通过对产生的故障密文进行标准数学分析,可以恢复密钥。据我们所知,这是第一次报道利用DPR来破坏FPGA上AES硬件实现的攻击。我们的实现结果表明,在使用标准的未经许可的FPGA设计工具时,这是在低硬件和计算开销下对AES进行的极其有效的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信