Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs

Susanne Engels, Maik Ender, C. Paar
{"title":"Targeted Bitstream Fault Fuzzing Accelerating BiFI on Large Designs","authors":"Susanne Engels, Maik Ender, C. Paar","doi":"10.1109/HOST55118.2023.10133494","DOIUrl":null,"url":null,"abstract":"Fault injection attacks are a powerful instrument in an attacker’s toolbox to extract secret keys from cryptographic primitives. Generally, detailed information about the implementation and platform is needed to conduct such an attack in a meaningful fashion. With Bitstream Fault Injection (BiFI), Swierczynski et al. demonstrated that even without any prior knowledge, an adversary could use bitstream faults to disclose the secret key of cryptographic implementations on FPGAs. With a brute-force strategy, an extensive set of faulty bitstreams is generated by manipulating the FPGA’s LUTs, some of which enable the adversary to attack the design successfully. The drawback of BiFI is that its runtime scales with the design size because of aforementioned brute-force approach. Hence, it can be prohibitively slow, e.g., months, for large state-of-the-art FPGAs.In this work, we present Targeted Bitstream Fault Fuzzing (TBFF), which accelerates BiFI by identifying candidates of vulnerable LUTs using automated netlist reverse-engineering algorithms. Hence, the goal of TBFF is to combine the best of both worlds: TBFF automatically identifies small but crucial structures that are part of most cryptographic primitives, such as counters, done signals, or SBoxes. Introducing faults in these structures often instantly results in faulty behavior that can be exploited to recover the secret key. As a result, instead of brute-forcing, only a few targeted bitstream manipulations are needed to recover the secret key with the marginal overhead of identifying the relevant areas. Extrapolating this result for large-scale designs, TBFF can be conducted in minutes compared to months using the previous brute-force approach. In various case studies, we demonstrate the efficacy of our attack by attacking several AES designs.","PeriodicalId":128125,"journal":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HOST55118.2023.10133494","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Fault injection attacks are a powerful instrument in an attacker’s toolbox to extract secret keys from cryptographic primitives. Generally, detailed information about the implementation and platform is needed to conduct such an attack in a meaningful fashion. With Bitstream Fault Injection (BiFI), Swierczynski et al. demonstrated that even without any prior knowledge, an adversary could use bitstream faults to disclose the secret key of cryptographic implementations on FPGAs. With a brute-force strategy, an extensive set of faulty bitstreams is generated by manipulating the FPGA’s LUTs, some of which enable the adversary to attack the design successfully. The drawback of BiFI is that its runtime scales with the design size because of aforementioned brute-force approach. Hence, it can be prohibitively slow, e.g., months, for large state-of-the-art FPGAs.In this work, we present Targeted Bitstream Fault Fuzzing (TBFF), which accelerates BiFI by identifying candidates of vulnerable LUTs using automated netlist reverse-engineering algorithms. Hence, the goal of TBFF is to combine the best of both worlds: TBFF automatically identifies small but crucial structures that are part of most cryptographic primitives, such as counters, done signals, or SBoxes. Introducing faults in these structures often instantly results in faulty behavior that can be exploited to recover the secret key. As a result, instead of brute-forcing, only a few targeted bitstream manipulations are needed to recover the secret key with the marginal overhead of identifying the relevant areas. Extrapolating this result for large-scale designs, TBFF can be conducted in minutes compared to months using the previous brute-force approach. In various case studies, we demonstrate the efficacy of our attack by attacking several AES designs.
目标比特流故障模糊化加速大型设计中的bii
故障注入攻击是攻击者工具箱中从加密原语中提取密钥的强大工具。通常,要以有意义的方式进行此类攻击,需要有关实现和平台的详细信息。通过比特流故障注入(BiFI), Swierczynski等人证明,即使没有任何先验知识,攻击者也可以使用比特流故障来泄露fpga上加密实现的密钥。使用暴力策略,通过操纵FPGA的lut产生大量错误的比特流,其中一些使对手能够成功地攻击设计。bii的缺点是,由于前面提到的暴力破解方法,它的运行时间随设计大小而变化。因此,对于最先进的大型fpga来说,它可能很慢,例如几个月。在这项工作中,我们提出了目标比特流故障模糊(TBFF),它通过使用自动网络列表反向工程算法识别易受攻击的lut的候选对象来加速BiFI。因此,TBFF的目标是将两者的优点结合起来:TBFF自动识别大多数加密原语(如计数器、done信号或sbox)中很小但很重要的结构。在这些结构中引入错误通常会立即导致错误行为,可以利用这些错误行为来恢复密钥。因此,不需要暴力破解,只需要几个有针对性的比特流操作就可以恢复密钥,并且只需要识别相关区域的边际开销。将这一结果外推到大规模设计中,与使用之前的蛮力方法数月相比,TBFF可以在几分钟内完成。在各种案例研究中,我们通过攻击几种AES设计来证明我们的攻击的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信