Fault Analysis Assisted by Simulation

Kais Chibani, Adrien Facon, Sylvain Guilley, Damien Marion, Yves Mathieu, Laurent Sauvage, Youssef Souissi, Sofiane Takarabt

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Side-channel and fault injection attacks are renown techniques to extract keys from cryptographic devices. Fortunately, leakage reduction and fault detection countermeasures exist and can be implemented right in the source-code. However, source-code level countermeasures might be altered during the compilation process. Design simulation is an effective means to detect such harmful simplifications. This is a well-known methodology to analyze regressions in terms of side-channel leakage. In this chapter, we explain that protections against fault injection attacks are no exception. First of all, we show that vulnerabilities to those attacks can be easily detected by simulation methods. Second, we highlight that simulation techniques are also highly efficient in detecting logic simplifications which destroy (fully or partly) the countermeasures. Thus, the simulation-based methodology we present in this chapter shows that it is possible to decide quickly which compilation options are safe and which ones are detrimental to the security.

Original languageEnglish
Title of host publicationAutomated Methods in Cryptographic Fault Analysis
PublisherSpringer International Publishing
Pages263-277
Number of pages15
ISBN (Electronic)9783030113339
ISBN (Print)9783030113322
DOIs
Publication statusPublished - 1 Jan 2019
Externally publishedYes

Fingerprint

Dive into the research topics of 'Fault Analysis Assisted by Simulation'. Together they form a unique fingerprint.

Cite this