{"title":"安全元件激光故障注入三重攻击链","authors":"Olivier Hériveaux","doi":"10.1109/FDTC57191.2022.00011","DOIUrl":null,"url":null,"abstract":"This work presents three vulnerabilities identified in the ATECC608B secure element. This circuit is the latest silicon revision of the ATECC devices family, which is widely deployed in IoT devices. When chained, the three vulnerabilities exploitation lead to a protected secret data extraction from the secure element. For this work, three different commands of the chip are faulted with laser illumination. The first attack recovers internal secret EEPROM masking keys. With the knowledge of those keys, further attacks are leveraged: we show how authentication and session key generation can be hijacked with laser assistance to finally gain authorized access to a secret data slot. We also used very long laser pulses for our attacks in order to fault multiple memory accesses with high efficiency. Our study was done in a black box approach, and shows multiple exploit attacks using laser fault injection can be practical. In particular, this allowed us to recover secret data on a real test device.","PeriodicalId":196228,"journal":{"name":"2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Triple Exploit Chain with Laser Fault Injection on a Secure Element\",\"authors\":\"Olivier Hériveaux\",\"doi\":\"10.1109/FDTC57191.2022.00011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This work presents three vulnerabilities identified in the ATECC608B secure element. This circuit is the latest silicon revision of the ATECC devices family, which is widely deployed in IoT devices. When chained, the three vulnerabilities exploitation lead to a protected secret data extraction from the secure element. For this work, three different commands of the chip are faulted with laser illumination. The first attack recovers internal secret EEPROM masking keys. With the knowledge of those keys, further attacks are leveraged: we show how authentication and session key generation can be hijacked with laser assistance to finally gain authorized access to a secret data slot. We also used very long laser pulses for our attacks in order to fault multiple memory accesses with high efficiency. Our study was done in a black box approach, and shows multiple exploit attacks using laser fault injection can be practical. In particular, this allowed us to recover secret data on a real test device.\",\"PeriodicalId\":196228,\"journal\":{\"name\":\"2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FDTC57191.2022.00011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Workshop on Fault Detection and Tolerance in Cryptography (FDTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FDTC57191.2022.00011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Triple Exploit Chain with Laser Fault Injection on a Secure Element
This work presents three vulnerabilities identified in the ATECC608B secure element. This circuit is the latest silicon revision of the ATECC devices family, which is widely deployed in IoT devices. When chained, the three vulnerabilities exploitation lead to a protected secret data extraction from the secure element. For this work, three different commands of the chip are faulted with laser illumination. The first attack recovers internal secret EEPROM masking keys. With the knowledge of those keys, further attacks are leveraged: we show how authentication and session key generation can be hijacked with laser assistance to finally gain authorized access to a secret data slot. We also used very long laser pulses for our attacks in order to fault multiple memory accesses with high efficiency. Our study was done in a black box approach, and shows multiple exploit attacks using laser fault injection can be practical. In particular, this allowed us to recover secret data on a real test device.