Defending the Citadel: Fault Injection Attacks against Dynamic Information Flow Tracking and Related Countermeasures - Equipe Hardware ARchitectures and CAD tools
Conference Papers Year : 2024

Defending the Citadel: Fault Injection Attacks against Dynamic Information Flow Tracking and Related Countermeasures

Abstract

Embedded processors are key components of Internet of Things (IoT) devices of Cyber-Physical Systems (CPSs) that manipulate sensitive data. In order to mitigate software attacks, hardware-assisted Dynamic Information Flow Tracking (DIFT) has been integrated into embedded processors. Due to their proximity to attackers, IoT devices are also exposed to physical attacks such as Fault Injection Attacks (FIAs). In this paper, we protect DIFT from fault injection attacks by extending current DIFT support with fault detection and correction capabilities. To do so, we design, implement and evaluate two countermeasures based on parity bit or Hamming code to protect DIFT-related registers of RISC-V CPUs. Our experimental results, obtained using the D-RI5CY processor as a use case, show a 100% fault detection and fault correction when relying on a Hamming code-based protection and a low area overhead (10.6\%) compared to the original design.
Fichier principal
Vignette du fichier
isvlsi2024_protectedDIFT-2.pdf (302.21 Ko) Télécharger le fichier
Origin Files produced by the author(s)

Dates and versions

hal-04620057 , version 1 (21-06-2024)

Identifiers

  • HAL Id : hal-04620057 , version 1

Cite

William Pensec, Francesco Regazzoni, Vianney Lapotre, Gogniat Guy. Defending the Citadel: Fault Injection Attacks against Dynamic Information Flow Tracking and Related Countermeasures. 2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), Jul 2024, Knoxville, United States. ⟨hal-04620057⟩
52 View
104 Download

Share

More