skip to main content
10.1145/3605769.3623991acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna

Published: 26 November 2023 Publication History

Abstract

Fault injection attacks on cryptographic modules pose significant threats, yet conventional fault injection methods require physical access to the target device. This paper introduces a novel fault injection method using Intentional Electromagnetic Interference (IEMI) to induce temporary faults in cryptographic modules without intrusion, proximity, or synchronization with the encryption process. The proposed method selects a frequency that can cause faults only in the target cryptographic modules without disrupting other modules in the device. Additionally, faults suitable for secret key analysis are efficiently generated even when EM waves are injected asynchronously into the cryptographic operation. To demonstrate the effectiveness of the proposed method, an experiment was conducted where EM waves were irradiated from an antenna positioned 2 meters away from a cryptographic device with an Advanced Encryption Standard (AES) implementation, inducing faults. The secret key was successfully retrieved by applying Differential Fault Analysis (DFA) to the obtained faulty ciphertexts. The proposed method holds the potential to be applied to devices that have previously been considered outside the scope of fault injection attack threats, owing to the difficulty in implementing conventional fault scenarios. This suggests a broader range of applicability for addressing security concerns in such devices. Consequently, there exists a possibility that even devices already in circulation could become susceptible to these threats, necessitating the implementation of measures to protect such equipment against potential attacks. In the countermeasure approach against this kind of threat, we propose and demonstrate the ability to significantly reduce the transmission efficiency of EM waves utilized for attacks by expanding upon the concept of EM shielding. Consequently, it significantly decreased the occurrence rate of faults. This is achieved by merely positioning conductive materials close to cryptographic devices rather than completely enclosing them in a conductive enclosure.

References

[1]
Md Mahbub Alam, Shahin Tajik, Fatemeh Ganji, Mark Tehranipoor, and Domenic Forte. 2019. RAM-Jam: Remote temperature and voltage fault attack on FPGAs using memory collisions. In 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 48--55.
[2]
Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, and Dhiman Saha. 2022. A survey on fault attacks on symmetric key cryptosystems. Comput. Surveys, Vol. 55, 4 (2022), 1--34.
[3]
Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall, and Claire Whelan. 2006. The sorcerer's apprentice guide to fault attacks. Proc. IEEE, Vol. 94, 2 (2006), 370--382.
[4]
Guillaume Barbu, Guillaume Duc, and Philippe Hoogvorst. 2011. Java card operand stack: fault attacks, combined attacks and countermeasures. In Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14--16, 2011, Revised Selected Papers 10. Springer, 297--313.
[5]
Alessandro Barenghi, Luca Breveglieri, Israel Koren, and David Naccache. 2012. Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. Proc. IEEE, Vol. 100, 11 (2012), 3056--3076.
[6]
Eli Biham and Adi Shamir. 1997. Differential fault analysis of secret key cryptosystems. In Advances in Cryptology-CRYPTO'97: 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17--21, 1997 Proceedings 17. Springer, 513--525.
[7]
Jakub Breier, Dirmanto Jap, and Chien-Ning Chen. 2015. Laser profiling for the back-side fault attacks: with a practical laser skip instruction attack on AES. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security. 99--103.
[8]
International Electrotechnical Commission. 2020. Electromagnetic compatibility (emc) - part 4--3 : Testing and measurement techniques - radiated, radiofrequency, electromagnetic field immunity test. Tech. Rep. IEC 61000--4- 3:2020, Vol. 8 Sept (2020). https://webstore.iec.ch/publication/59849
[9]
International Electrotechnical Commission. 2023. Electromagnetic compatibility (emc) - part 4--6: Testing and measurement techniques - Immunity to conducted disturbances, induced by radio-frequency fields. Tech. Rep. IEC 61000--4- 6:2023 PRV Pre release version, Vol. 24 Mar (2023). https://webstore.iec.ch/publication/84355
[10]
Ang Cui and Rick Housley. 2017. BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection. In WOOT.
[11]
Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, Philippe Orsatelli, Philippe Maurine, and Assia Tria. 2012b. Injection of transient faults using electromagnetic pulses Practical results on a cryptographic system. ACR Cryptology ePrint Archive (2012) (2012).
[12]
Amine Dehbaoui, Jean-Max Dutertre, Bruno Robisson, and Assia Tria. 2012a. Electromagnetic transient faults injection on a hardware and a software implementations of AES. In 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, 7--15.
[13]
Mathieu Dumont, Mathieu Lisart, and Philippe Maurine. 2019. Electromagnetic fault injection: How faults occur. In 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 9--16.
[14]
David El-Baze, Jean-Baptiste Rigaud, and Philippe Maurine. 2016. A fully-digital EM pulse detector. In 2016 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 439--444.
[15]
Mahmoud A Elmohr, Haohao Liao, and Catherine H Gebotys. 2020. EM fault injection on ARM and RISC-V. In 2020 21st International Symposium on Quality Electronic Design (ISQED). IEEE, 206--212.
[16]
Thomas Fuhr, Éliane Jaulmes, Victor Lomné, and Adrian Thillard. 2013. Fault attacks on AES with faulty ciphertexts only. In 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, 108--118.
[17]
Christophe Giraud and Adrian Thillard. 2010. Piret and Quisquater's DFA on AES Revisited. Cryptology ePrint Archive (2010).
[18]
Mathieu Gross, Jonas Krautter, Dennis Gnad, Michael Gruber, Georg Sigl, and Mehdi Tahoori. 2023. FPGANeedle: Precise Remote Fault Attacks from FPGA to CPU. In Proceedings of the 28th Asia and South Pacific Design Automation Conference. 358--364.
[19]
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, and Nidhal Selmane. 2010. Fault injection resilience. In 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, 51--65.
[20]
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, and Renaud Pacalet. 2008. Silicon-level solutions to counteract passive and active attacks. In 2008 5th Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, 3--17.
[21]
Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone. 2012. Transient IEMI threats for cryptographic devices. IEEE transactions on Electromagnetic Compatibility, Vol. 55, 1 (2012), 140--148.
[22]
Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. 2014. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. ACM SIGARCH Computer Architecture News, Vol. 42, 3 (2014), 361--372.
[23]
Thomas Korak and Michael Hoefler. 2014. On the effects of clock and power supply tampering on two microcontroller platforms. In 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, 8--17.
[24]
Jonas Krautter, Dennis RE Gnad, and Mehdi B Tahoori. 2018. FPGAhammer: Remote voltage fault attacks on shared FPGAs, suitable for DFA on AES. IACR Transactions on Cryptographic Hardware and Embedded Systems (2018), 44--68.
[25]
Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta. 2010. Fault sensitivity analysis. In Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International Workshop, Santa Barbara, USA, August 17--20, 2010. Proceedings 12. Springer, 320--334.
[26]
Yifan Lu. 2019. Injecting software vulnerabilities with voltage glitching. arXiv preprint arXiv:1903.08102 (2019).
[27]
Fabien Majéric, Eric Bourbao, and Lilian Bossuet. 2016. Electromagnetic security tests for SoC. In 2016 IEEE International Conference on Electronics, Circuits and Systems (ICECS). IEEE, 265--268.
[28]
Noriyuki Miura, Daisuke Fujimoto, and Makoto Nagata. 2015. Proactive and reactive protection circuit techniques against EM leakage and injection. In 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC). IEEE, 252--257.
[29]
Kit Murdock, David Oswald, Flavio D Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens. 2020. Plundervolt: Software-based fault injection attacks against Intel SGX. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1466--1482.
[30]
Ko Nakamura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone. 2017. Information leakage threats for cryptographic devices using IEMI and EM emission. IEEE Transactions on Electromagnetic Compatibility, Vol. 60, 5 (2017), 1340--1347.
[31]
National Institute of Standards and Technology (NIST). 2001. Advanced Encryption Standard (AES). fips publication 197 (2001).
[32]
Colin O'Flynn. 2019. MIN () imum Failure: EMFI Attacks against USB Stacks. In WOOT@ USENIX Security Symposium.
[33]
Clayton R Paul. 1992. Introduction to Electromagnetic Compatibility. John Wiley & Sons. 301--308 pages.
[34]
Gilles Piret and Jean-Jacques Quisquater. 2003. A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. In Cryptographic Hardware and Embedded Systems-CHES 2003: 5th International Workshop, Cologne, Germany, September 8--10, 2003. Proceedings 5. Springer, 77--88.
[35]
William Radasky and Edward Savage. 2010. Intentional electromagnetic interference (IEMI) and its impact on the US power grid. Meta, Vol. 1 (2010), 1--3.
[36]
Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, and Kazuo Ohta. 2014. Practical DFA strategy for AES under limited-access conditions. Journal of information processing, Vol. 22, 2 (2014), 142--151.
[37]
Akashi Satoh, Sumio Morioka, Kohji Takano, and Seiji Munetoh. 2001. A compact Rijndael hardware architecture with S-box optimization. In Advances in Cryptology-ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9--13, 2001 Proceedings. Springer, 239--254.
[38]
Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, and David Naccache. 2021. Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis. Computers & Security, Vol. 111 (2021), 102471.
[39]
Adrian Tang, Simha Sethumadhavan, and Salvatore J Stolfo. 2017. CLKSCREW: Exposing the perils of security-oblivious energy management. In USENIX Security Symposium, Vol. 2. 1057--1074.
[40]
Jasper GJ Van Woudenberg, Marc F Witteman, and Federico Menarini. 2011. Practical optical fault injection on secure microcontrollers. In 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, 91--99.
[41]
Maoshen Zhang, He Li, Peijing Wang, and Qiang Liu. 2022. Parity Check Based Fault Detection against Timing Fault Injection Attacks. Electronics, Vol. 11, 24 (2022), 4082.
[42]
Loic Zussa, Amine Dehbaoui, Karim Tobich, Jean-Max Dutertre, Philippe Maurine, Ludovic Guillaume-Sage, Jessy Clediere, and Assia Tria. 2014. Efficiency of a glitch detector against electromagnetic fault injection. In 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 1--6.
[43]
Loic Zussa, Jean-Max Dutertre, Jessy Clediere, and Assia Tria. 2013. Power supply glitch induced faults on FPGA: An in-depth analysis of the injection mechanism. In 2013 IEEE 19th International On-Line Testing Symposium (IOLTS). IEEE, 110--115. io

Cited By

View all
  • (2024)Controlling Faulty Byte Outputs with IEMI against Cryptographic ICs2024 14th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo)10.1109/EMCCompo61192.2024.10742058(1-5)Online publication date: 7-Oct-2024

Index Terms

  1. Remote Fault Injection Attack against Cryptographic Modules via Intentional Electromagnetic Interference from an Antenna

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASHES '23: Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security
    November 2023
    138 pages
    ISBN:9798400702624
    DOI:10.1145/3605769
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 November 2023

    Check for updates

    Author Tags

    1. differential fault analysis (dfa)
    2. electromagnetic shielding
    3. fault injection attack
    4. intentional electromagnetic interference (iemi)

    Qualifiers

    • Research-article

    Funding Sources

    • JST FOREST
    • JSPS KAKENHI
    • JST CREST
    • JSPS KAKENHI

    Conference

    CCS '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6 of 20 submissions, 30%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)77
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Controlling Faulty Byte Outputs with IEMI against Cryptographic ICs2024 14th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo)10.1109/EMCCompo61192.2024.10742058(1-5)Online publication date: 7-Oct-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media