Back to Search Start Over

FaultDetective

Authors :
Zhenyuan Liu
Dillibabu Shanmugam
Patrick Schaumont
Source :
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Publication Year :
2024
Publisher :
Ruhr-Universität Bochum, 2024.

Abstract

Hardware faults are a known source of security vulnerabilities. Fault injection in secure embedded systems leads to information leakage and privilege escalation, and countless fault attacks have been demonstrated both in simulation and in practice. However, there is a significant gap between simulated fault attacks and physical fault attacks. Simulations use idealized fault models such as single-bit flips with uniform distribution. These ideal fault models may not hold in practice. On the other hand, practical experiments lack the white-box visibility necessary to determine the true nature of the fault, leading to probabilistic vulnerability assessments and unexplained results. In embedded software, this problem is further exacerbated by the layered abstractions between the hardware (where the fault originates) and the application software (where the fault effect is observed). We present FaultDetective, a method to investigate the root-cause of fault injection from fault detection in software. Our main insight is that fault detection in software is only the end-point of a chain of events that starts with a fault manifestation in hardware and propagates through the micro-architecture and architecture before reaching the software level. To understand the fault effects at the hardware level, we use a scan chain, a low-level hardware test structure. We then use white-box simulation to propagate and observe hardware faults in the embedded software. We efficiently visualize the fault propagation across abstraction levels using a hash-tree representation of the scan chain. We implement this concept in a multi-core MSP430 micro-controller that redundantly executes an application in lock-step. With this setup, we observe the fault effects for several different stressors, including clock glitching and thermal laser stimulation, and explain the root-cause in each case.

Details

Language :
English
ISSN :
25692925
Volume :
2024
Issue :
4
Database :
Directory of Open Access Journals
Journal :
Transactions on Cryptographic Hardware and Embedded Systems
Publication Type :
Academic Journal
Accession number :
edsdoj.b6efb1f4d82f4b9e9262d1f1ff300f8b
Document Type :
article
Full Text :
https://doi.org/10.46586/tches.v2024.i4.610-632