Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 359-362.doi: 10.11896/jsjkx.200100096

• Information Security • Previous Articles     Next Articles

Review of Clock Glitch Injection Attack Technology

YANG Peng, OU Qing-yu, FU Wei   

  1. Department of Information Security,Naval University of Engineering,Wuhan 430000,China
  • Online:2020-11-15 Published:2020-11-17
  • About author:YANG Peng,born in 1996,postgra-duate.His main research interests include cryptographic chip security assessment.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61672531).

Abstract: Clock glitch injection is an effective and commonly used fault injection method in the real environment.Clock glitch injection is to introduce a period of glitch clock in the normal clock cycle,so that one or more triggers accept the error state to modi-fy the instruction,destroy the data or state,and finally make the secret information in the chip leak with the error operation.This paper analyzes the causes of clock failure.Several main glitch injection mechanisms are described,including clock switching at the same frequency,clock switching at different frequencies,and fuzzy clock injection.Finally,the latest practical applications and future development directions of the three clock glitch injection attacks are introduced.

Key words: Clock glitch, Fault attack, Fault injection mechanism

CLC Number: 

  • TP309.1
[1] KOCHER P C.Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS,and Other Systems [C]//Advances in Cryptology - CRYPTO'96.1996:104-113.
[2] KOCHER P,JAFFE J,JUN B.Differential Power Analysis[C]//Advances in Cryptology - CRYPTO'99.1999:388-397.
[3] GANDOLFI K,MOURTEL C,OLIVIER F.ElectromagneticAnalysis:Concrete Results[C]//Cryptographic Hardware and Embedded Systems-CHES 2001.2001:251-261.
[4] BONEH D,DEMILLO R A,LIPTON R J.On the Importance of Checking Cryptographic Protocols for Faults[C]//Advances in Cryptology - EUROCRYPT'97.1997:37-51.
[5] INGRID V,DUSKO K,SCHMIDT J.The Fault Attack Jungle-A Classification Model to Guide You[C]//2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.IEEE,2011:3-8.
[6] CAI F F,BAI G Q,LIU X B,et al.Optical fault injection attacks for flash memory of smartcards[C]//2016 6th International Conference on Electronics Information and Emergency Communication (ICEIEC).IEEE,2016:46-50.
[7] GHODRATI M,YUCE B,GUJAR S,et al.Inducing Local Ti-ming Fault Through EM Injection[C]//2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).IEEE,2018:1-6.
[8] KIM C H,QUISQUATER J J.Faults,Injection Methods,andFault Attacks[C]//IEEE Design & Test of Computers.IEEE,2007:544-545.
[9] AGOYAN M,DUTERTRE J M,NACCACHE D,et al.When Clocks Fail:On Critical Paths and Clock Faults[J].Smart Card Research and Advanced Application,2010,6035:182-193.
[10] DADJOU M.Analysis and Design of Clock-glitch Fault Injection within an FPGA[EB/OL].http://hdl.handle.net/10012/7964.
[11] FUKUNAGA T,TAKAHASHI J.Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers[C]//2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).IEEE,2010:84-92.
[12] MATSUBAYASHI M,SATOH A,ISHII J.Clock glitch generator on SAKURA-G for fault injection attack against a cryptographic circuit[C]//2016 IEEE 5th Global Conference on Consumer Electronics.IEEE,2016:5-8.
[13] BALASCH J,GIERLICHS B,VERBAUWHEDE I.An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs[C]//2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.IEEE,2011:105-114.
[14] OBERMAIER J,SPECHT R,SIGL G.Fuzzy-glitch:A practical ring oscillator based clock glitch attack[C]//2017 International Conference on Applied Electronics (AE).IEEE,2017:1-6.
[15] ENDO S,SUGAWARA T,HOMMA N,et al.An on-chipglitchy-clock generator for testing fault injection attacks[J].Journal of Cryptographic Engineering,2011,1:265-270.
[16] YUCE B,GHALATY N F,SCHAUMONT P.Improving Fault Attacks on Embedded Software Using RISC Pipeline Characterization[C]//2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).IEEE,2016:97-108.
[17] KORAK T,HOEFLER M.On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms[C]//2014 Workshop on Fault Diagnosis and Tolerance in Cryptography.IEEE,2014:8-17.
[18] QIAO Y F.Clock Fault Injection Attack on AES and Countermeasures[D].Wuhan:Huazhong University of Science & Technology,2017.
[19] KORCZYC J,KRASNIEWSKI A.Evaluation of susceptibility of FPGA-based circuits to fault injection attacks based on clock glitching[C]//2012 IEEE 15th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS).IEEE,2012:2-5.
[20] QIAO Y F,LU Z J,LIU H L,et al.Clock Glitch Fault Injection Attacks on an FPGA AES Implementation[J].Journal of Electrotechnology,Electrical Engineering and Management,2017,1:23-27.
[21] KORAK T,HUTTER M,EGE B,et al.Clock Glitch Attacks in the Presence of Heating[C]//2014 Workshop on Fault Diagnosis and Tolerance in Cryptography.IEEE,2014:104-114.
[22] KAZEMI Z,PAPADIMITRIOU A,SOUVATZOGLOU I,et al.On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems:Clock Glitch Attacks[C]//2019 IEEE 4th International Verification and Security Workshop (IVSW).IEEE,2019:7-12.
[23] BONNY T,NASIR Q.Clock glitch fault injection attack on an FPGA-based non-autonomous chaotic oscillator[J].Nonlinear Dynamics,2019,96:2087-2101.
[1] WANG Jian, CHEN Hua, KUANG Xiao-yun, YANG Yi-wei, HUANG Kai-tian. Study on Threat of Persistent Fault Attack [J]. Computer Science, 2021, 48(11A): 523-527.
[2] ZHU Ren-jie. Study on SM4 Differential Fault Attack Under Extended Fault Injection Range [J]. Computer Science, 2019, 46(11A): 493-495.
[3] LI Jia-yu, SHI Hui, DENG Yuan-qing, GONG Jing and GUAN Yu. Differential Fault Attack and Analysis of Improvement on LEX [J]. Computer Science, 2015, 42(Z11): 352-356.
[4] WANG Lu, HU Yu-pu , GHANG Zhen-guang. Differential Fault Analysis of Grain-v1 [J]. Computer Science, 2011, 38(8): 80-82.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!