Attacking Hardware AES with DFA

02/22/2019
by   Yifan Lu, et al.
0

We present the first practical attack on a hardware AES accelerator with 256 bit embedded keys using DFA. We identify the challenges of adapting well-known theoretical AES DFA models to hardware under attack from voltage fault injection and present solutions to those challenges. As a result, we managed to recover 278 real-world AES-256 keys from a secure computing system in a matter of hours with minimal cost.

READ FULL TEXT

page 8

page 9

research
02/04/2020

A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes

A fault injection framework for the decryption algorithm of the Niederre...
research
05/31/2022

Discovery of Keys for Graphs [Extended Version]

Keys for graphs uses the topology and value constraints needed to unique...
research
08/31/2023

Fault Injection and Safe-Error Attack for Extraction of Embedded Neural Network Models

Model extraction emerges as a critical security threat with attack vecto...
research
07/19/2019

Stronger and Faster Side-Channel Protections for CSIDH

CSIDH is a recent quantum-resistant primitive based on the difficulty of...
research
06/13/2021

Single Event Transient Fault Analysis of ELEPHANT cipher

In this paper, we propose a novel fault attack termed as Single Event Tr...
research
04/17/2023

Evil from Within: Machine Learning Backdoors through Hardware Trojans

Backdoors pose a serious threat to machine learning, as they can comprom...
research
04/12/2023

Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators

Logic locking has been proposed to safeguard intellectual property (IP) ...

Please sign up or login with your details

Forgot password? Click here to reset