Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Title | Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Kazemi, Z., Fazeli, M., Hély, D., Beroulle, V. |
Conference Name | 2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS) |
Date Published | July 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-8187-5 |
Keywords | composability, critical embedded application, critical medical IoT device, Detection and Mitigation, embedded software developers, Embedded systems, Fault Attacks, fault injection attack, fault injection attacks, hardware security, hardware security assessment approach, hardware security vulnerability assessment, Internet of Things, Internet of Things (IoT), Metrics, microcontrollers, patient care, physical attacks, power system security, pubcrawl, resilience, Resiliency, resilient applications, safety-critical applications, safety-critical software, secure embedded IoT applications, security challenges, security of data, security risks, similar MCU-based applications |
Abstract | Internet of Things (IoT) is experiencing significant growth in the safety-critical applications which have caused new security challenges. These devices are becoming targets for different types of physical attacks, which are exacerbated by their diversity and accessibility. Therefore, there is a strict necessity to support embedded software developers to identify and remediate the vulnerabilities and create resilient applications against such attacks. In this paper, we propose a hardware security vulnerability assessment based on fault injection of an embedded application. In our security assessment, we apply a fault injection attack by using our clock glitch generator on a critical medical IoT device. Furthermore, we analyze the potential risks of ignoring these attacks in this embedded application. The results will inform the embedded software developers of various security risks and the required steps to improve the security of similar MCU-based applications. Our hardware security assessment approach is easy to apply and can lead to secure embedded IoT applications against fault attacks. |
URL | https://ieeexplore.ieee.org/document/9159739 |
DOI | 10.1109/IOLTS50870.2020.9159739 |
Citation Key | kazemi_hardware_2020 |
- microcontrollers
- similar MCU-based applications
- security risks
- security of data
- security challenges
- secure embedded IoT applications
- safety-critical software
- safety-critical applications
- resilient applications
- Resiliency
- resilience
- pubcrawl
- power system security
- physical attacks
- patient care
- composability
- Metrics
- Internet of Things (IoT)
- Internet of Things
- hardware security vulnerability assessment
- hardware security assessment approach
- Hardware Security
- fault injection attacks
- fault injection attack
- Fault Attacks
- embedded systems
- embedded software developers
- Detection and Mitigation
- critical medical IoT device
- critical embedded application