计算机科学 ›› 2020, Vol. 47 ›› Issue (11A): 359-362.doi: 10.11896/jsjkx.200100096

• 信息安全 • 上一篇    下一篇

时钟毛刺注入攻击技术综述

杨鹏, 欧庆于, 付伟   

  1. 海军工程大学信息安全系 武汉 430000
  • 出版日期:2020-11-15 发布日期:2020-11-17
  • 通讯作者: 杨鹏(849593165@qq.com)
  • 基金资助:
    国家自然科学基金(61672531)

Review of Clock Glitch Injection Attack Technology

YANG Peng, OU Qing-yu, FU Wei   

  1. Department of Information Security,Naval University of Engineering,Wuhan 430000,China
  • Online:2020-11-15 Published:2020-11-17
  • About author:YANG Peng,born in 1996,postgra-duate.His main research interests include cryptographic chip security assessment.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61672531).

摘要: 时钟毛刺注入是现实环境中有效且常用的故障注入方法。时钟毛刺注入是通过在正常时钟周期中引入一段毛刺时钟,使得一个或多个触发器接受错误状态而修改指令、破坏数据或状态,最终使芯片内的秘密信息随着产生的错误操作而泄露。文中对时钟故障的产生原因进行了分析,并描述了几种主要的毛刺注入机制,包括相同频率时钟切换、不同频率时钟切换以及模糊时钟注入。最后介绍了3种时钟毛刺注入攻击的最新实际运用和未来的发展方向。

关键词: 故障攻击, 故障注入机制, 时钟毛刺

Abstract: Clock glitch injection is an effective and commonly used fault injection method in the real environment.Clock glitch injection is to introduce a period of glitch clock in the normal clock cycle,so that one or more triggers accept the error state to modi-fy the instruction,destroy the data or state,and finally make the secret information in the chip leak with the error operation.This paper analyzes the causes of clock failure.Several main glitch injection mechanisms are described,including clock switching at the same frequency,clock switching at different frequencies,and fuzzy clock injection.Finally,the latest practical applications and future development directions of the three clock glitch injection attacks are introduced.

Key words: Clock glitch, Fault attack, Fault injection mechanism

中图分类号: 

  • TP309.1
[1] KOCHER P C.Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS,and Other Systems [C]//Advances in Cryptology - CRYPTO'96.1996:104-113.
[2] KOCHER P,JAFFE J,JUN B.Differential Power Analysis[C]//Advances in Cryptology - CRYPTO'99.1999:388-397.
[3] GANDOLFI K,MOURTEL C,OLIVIER F.ElectromagneticAnalysis:Concrete Results[C]//Cryptographic Hardware and Embedded Systems-CHES 2001.2001:251-261.
[4] BONEH D,DEMILLO R A,LIPTON R J.On the Importance of Checking Cryptographic Protocols for Faults[C]//Advances in Cryptology - EUROCRYPT'97.1997:37-51.
[5] INGRID V,DUSKO K,SCHMIDT J.The Fault Attack Jungle-A Classification Model to Guide You[C]//2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.IEEE,2011:3-8.
[6] CAI F F,BAI G Q,LIU X B,et al.Optical fault injection attacks for flash memory of smartcards[C]//2016 6th International Conference on Electronics Information and Emergency Communication (ICEIEC).IEEE,2016:46-50.
[7] GHODRATI M,YUCE B,GUJAR S,et al.Inducing Local Ti-ming Fault Through EM Injection[C]//2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).IEEE,2018:1-6.
[8] KIM C H,QUISQUATER J J.Faults,Injection Methods,andFault Attacks[C]//IEEE Design & Test of Computers.IEEE,2007:544-545.
[9] AGOYAN M,DUTERTRE J M,NACCACHE D,et al.When Clocks Fail:On Critical Paths and Clock Faults[J].Smart Card Research and Advanced Application,2010,6035:182-193.
[10] DADJOU M.Analysis and Design of Clock-glitch Fault Injection within an FPGA[EB/OL].http://hdl.handle.net/10012/7964.
[11] FUKUNAGA T,TAKAHASHI J.Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers[C]//2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).IEEE,2010:84-92.
[12] MATSUBAYASHI M,SATOH A,ISHII J.Clock glitch generator on SAKURA-G for fault injection attack against a cryptographic circuit[C]//2016 IEEE 5th Global Conference on Consumer Electronics.IEEE,2016:5-8.
[13] BALASCH J,GIERLICHS B,VERBAUWHEDE I.An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs[C]//2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.IEEE,2011:105-114.
[14] OBERMAIER J,SPECHT R,SIGL G.Fuzzy-glitch:A practical ring oscillator based clock glitch attack[C]//2017 International Conference on Applied Electronics (AE).IEEE,2017:1-6.
[15] ENDO S,SUGAWARA T,HOMMA N,et al.An on-chipglitchy-clock generator for testing fault injection attacks[J].Journal of Cryptographic Engineering,2011,1:265-270.
[16] YUCE B,GHALATY N F,SCHAUMONT P.Improving Fault Attacks on Embedded Software Using RISC Pipeline Characterization[C]//2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).IEEE,2016:97-108.
[17] KORAK T,HOEFLER M.On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms[C]//2014 Workshop on Fault Diagnosis and Tolerance in Cryptography.IEEE,2014:8-17.
[18] QIAO Y F.Clock Fault Injection Attack on AES and Countermeasures[D].Wuhan:Huazhong University of Science & Technology,2017.
[19] KORCZYC J,KRASNIEWSKI A.Evaluation of susceptibility of FPGA-based circuits to fault injection attacks based on clock glitching[C]//2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS).IEEE,2012:2-5.
[20] QIAO Y F,LU Z J,LIU H L,et al.Clock Glitch Fault Injection Attacks on an FPGA AES Implementation[J].Journal of Electrotechnology,Electrical Engineering and Management,2017,1:23-27.
[21] KORAK T,HUTTER M,EGE B,et al.Clock Glitch Attacks in the Presence of Heating[C]//2014 Workshop on Fault Diagnosis and Tolerance in Cryptography.IEEE,2014:104-114.
[22] KAZEMI Z,PAPADIMITRIOU A,SOUVATZOGLOU I,et al.On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems:Clock Glitch Attacks[C]//2019 IEEE 4th International Verification and Security Workshop (IVSW).IEEE,2019:7-12.
[23] BONNY T,NASIR Q.Clock glitch fault injection attack on an FPGA-based non-autonomous chaotic oscillator[J].Nonlinear Dynamics,2019,96:2087-2101.
[1] 王舰, 陈华, 匡晓云, 杨祎巍, 黄开天.
持久故障攻击威胁性研究
Study on Threat of Persistent Fault Attack
计算机科学, 2021, 48(11A): 523-527. https://doi.org/10.11896/jsjkx.210200138
[2] 朱仁杰.
扩大故障注入范围的SM4差分故障攻击研究
Study on SM4 Differential Fault Attack Under Extended Fault Injection Range
计算机科学, 2019, 46(11A): 493-495.
[3] 李佳雨,石会,邓元庆,龚晶,关宇.
针对流密码LEX的差分故障攻击及算法改进分析
Differential Fault Attack and Analysis of Improvement on LEX
计算机科学, 2015, 42(Z11): 352-356.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!