Defending the Citadel: Fault Injection Attacks Against Dynamic Information Flow Tracking and Related Countermeasures

Open Access
Authors
Publication date 2024
Host editors
  • H. Thapliyal
  • J. Becker
Book title 2024 IEEE Computer Society Annual Symposium on VLSI : ISVLSI 2024
Book subtitle Emerging VLSI technologies and architectures : Knoxville, USA, July 1-3, 2024 : proceedings
ISBN
  • 9798350354126
ISBN (electronic)
  • 9798350354119
Event 2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
Pages (from-to) 180-185
Publisher Piscataway, NJ: IEEE Computer Society
Organisations
  • Faculty of Science (FNWI) - Informatics Institute (IVI)
Abstract
Embedded processors are key components of Internet of Things (IoT) devices of Cyber-Physical Systems (CPSs) that manipulate sensitive data. In order to mitigate software attacks, hardware-assisted Dynamic Information Flow Tracking (DIFT) has been integrated into embedded processors. Due to their proximity to attackers, IoT devices are also exposed to physical attacks such as Fault Injection Attacks (FIAs). In this paper, we protect DIFT from fault injection attacks by extending current DIFT support with fault detection and correction capabilities. To do so, we design, implement and evaluate two countermeasures based on parity bit or Hamming code to protect DIFT-related registers of RISC-V CPUs. Our experimental results, obtained using the D-RI5CY processor as a use case, show a 100 % fault detection and fault correction when relying on a Hamming code-based protection and a low area overhead (10.6%) compared to the original design.
Document type Conference contribution
Language English
Published at https://doi.org/10.1109/isvlsi61997.2024.00042
Other links https://www.proceedings.com/76390.html
Downloads
Defending the Citadel (Final published version)
Permalink to this page
Back