Title | High Precision Laser Fault Injection Using Low-Cost Components. |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Kelly, Martin S., Mayes, Keith |
Conference Name | 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) |
Keywords | Clocks, cyber physical systems, field programmable gate arrays, Human Behavior, human factors, Laser applications, Lasers, Metrics, multiple fault diagnosis, pubcrawl, resilience, Resiliency, semiconductor lasers, Software, Synchronization |
Abstract | This paper demonstrates that it is possible to execute sophisticated and powerful fault injection attacks on microcontrollers using low-cost equipment and readily available components. Earlier work had implied that powerful lasers and high grade optics frequently used to execute such attacks were being underutilized and that attacks were equally effective when using low-power settings and imprecise focus. This work has exploited these earlier findings to develop a low-cost laser workstation capable of generating multiple discrete faults with timing accuracy capable of targeting consecutive instruction cycles. We have shown that the capabilities of this new device exceed those of the expensive laboratory equipment typically used in related work. We describe a simplified fault model to categorize the effects of induced errors on running code and use it, along with the new device, to reevaluate the efficacy of different defensive coding techniques. This has enabled us to demonstrate an efficient hybrid defense that outperforms the individual defenses on our chosen target. This approach enables device programmers to select an appropriate compromise between the extremes of undefended code and unusable overdefended code, to do so specifically for their chosen device and without the need for prohibitively expensive equipment. This work has particular relevance in the burgeoning IoT world where many small companies with limited budgets are deploying low-cost microprocessors in ever more security sensitive roles. |
DOI | 10.1109/HOST45689.2020.9300265 |
Citation Key | kelly_high_2020 |