SoK: Assisted Fault Simulation

Existing Challenges and Opportunities Offered by AI

  • Conference paper
  • First Online:
Applied Cryptography and Network Security Workshops (ACNS 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13907))

Included in the following conference series:

Abstract

Fault injection attacks have caused implementations to behave unexpectedly, resulting in a spectacular bypass of security features and even the extraction of cryptographic keys. Clearly, developers want to ensure the robustness of the software against faults and eliminate production weaknesses that could lead to exploitation. Several fault simulators have been released that promise cost-effective evaluations against fault attacks. In this paper, we set out to discover how suitable such tools are, for a developer who wishes to create robust software against fault attacks. We found four open-source fault simulators that employ different techniques to navigate faults, which we objectively compare and discuss their benefits and drawbacks. Unfortunately, none of the four open-source fault simulators employ artificial intelligence (AI) techniques. However, AI was successfully applied to improve the fault simulation of cryptographic algorithms, though none of these tools is open source. We suggest improvements to open-source fault simulators inspired by the AI techniques used by cryptographic fault simulators.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now
Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 74.89
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 96.29
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The terms, simulation, and emulation, have been used interchangeably.

  2. 2.

    https://github.com/vporpo/zofi.

  3. 3.

    https://github.com/emsec/arm-fault-simulator.

  4. 4.

    https://github.com/Fraunhofer-AISEC/archie.

  5. 5.

    https://github.com/Riscure/FiSim/releases.

  6. 6.

    By masked instructions, the authors mean instructions that are not vulnerable to fault effects.

  7. 7.

    24:46:39.962 h implies 24 h, 46 min and 39.962 s.

References

  1. Arribas, V., Wegener, F., Moradi, A., Nikova, S.: Cryptographic fault diagnosis using VerFI. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, 7–11 December 2020, pp. 229–240. IEEE (2020)

    Google Scholar 

  2. Becker, M., Baldin, D., Kuznik, C., Joy, M.M., **e, T., Müller, W.: XEMU: an efficient QEMU based binary mutation testing framework for embedded software. In: Jerraya, A., Carloni, L.P., Maraninchi, F., Regehr, J. (eds.) Proceedings of the 12th International Conference on Embedded Software, EMSOFT 2012, part of the Eighth Embedded Systems Week, ESWeek 2012, Tampere, Finland, 7–12 October 2012, pp. 33–42. ACM (2012)

    Google Scholar 

  3. Bosio, A., Natale, G.D.: LIFTING: a flexible open-source fault simulator. In: 17th IEEE Asian Test Symposium, ATS 2008, Sapporo, Japan, 24–27 November 2008, pp. 35–40. IEEE Computer Society (2008)

    Google Scholar 

  4. Breier, J., Hou, X., Bhasin, S.: Automated Methods in Cryptographic Fault Analysis. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11333-9

  5. Breier, J., Hou, X., Liu, Y.: Fault attacks made easy: differential fault analysis automation on assembly code. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2), 96–122 (2018)

    Article  Google Scholar 

  6. Burchard, J., et al.: AutoFault: towards automatic construction of algebraic fault attacks. In: 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2017, Taipei, Taiwan, 25 September 2017, pp. 65–72. IEEE Computer Society (2017)

    Google Scholar 

  7. Carpi, R.B., Picek, S., Batina, L., Menarini, F., Jakobovic, D., Golub, M.: Glitch it if you can: parameter search strategies for successful fault injection. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 236–252. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-08302-5_16

    Chapter  Google Scholar 

  8. Chyłek, S., Goliszewski, M.: Qemu-based fault injection framework. Stud. Inform. 33, 25–42 (2012)

    Google Scholar 

  9. Clark, D., Hunt, S., Malacaria, P.: Quantified interference: information theory and information flow. In: Workshop on Issues in the Theory of Security (WITS’04) (2004)

    Google Scholar 

  10. Ferraretto, D., Pravadelli, G.: Efficient fault injection in QEMU. In: 16th Latin-American Test Symposium, LATS 2015, Puerto Vallarta, Mexico, 25–27 March 2015, pp. 1–6. IEEE Computer Society (2015)

    Google Scholar 

  11. Grycel, J.T., Schaumont, P.: Simplifi: hardware simulation of embedded software fault attacks. Cryptogr. 5(2), 15 (2021)

    Article  Google Scholar 

  12. Hauschild, F., Garb, K., Auer, L., Selmke, B., Obermaier, J.: ARCHIE: a QEMU-based framework for architecture-independent evaluation of faults. In: 18th Workshop on Fault Detection and Tolerance in Cryptography, FDTC 2021, Milan, Italy, 17 September 2021, pp. 20–30. IEEE (2021)

    Google Scholar 

  13. Hoffmann, M., Schellenberg, F., Paar, C.: ARMORY: fully automated and exhaustive fault simulation on ARM-M binaries. IEEE Trans. Inf. Forensics Secur. 16, 1058–1073 (2021)

    Article  Google Scholar 

  14. Hou, X., Breier, J., Zhang, F., Liu, Y.: Fully automated differential fault analysis on software implementations of block ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3), 1–29 (2019)

    Google Scholar 

  15. Jenn, E., Arlat, J., Rimén, M., Ohlsson, J., Karlsson, J.: Fault injection into VHDL models: the MEFISTO tool. In: Digest of Papers: FTCS/24, The Twenty-Fourth Annual International Symposium on Fault-Tolerant Computing, Austin, Texas, USA, 15–17 June 1994, pp. 66–75. IEEE Computer Society (1994)

    Google Scholar 

  16. Keerthi, K., Rebeiro, C.: FaultMeter: quantitative fault attack assessment of block cipher software. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2), 212–240 (2023)

    Google Scholar 

  17. Keerthi, K., Roy, I., Rebeiro, C., Hazra, A., Bhunia, S.: FEDS: comprehensive fault attack exploitability detection for software implementations of block ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2), 272–299 (2020)

    Google Scholar 

  18. Khanna, P., Rebeiro, C., Hazra, A.: XFC: a framework for exploitable fault characterization in block ciphers. In: Proceedings of the 54th Annual Design Automation Conference, DAC 2017, Austin, TX, USA, 18–22 June 2017, pp. 8:1–8:6. ACM (2017)

    Google Scholar 

  19. Krcek, M., Ordas, T., Fronte, D., Picek, S.: The more you know: improving laser fault injection with prior knowledge. In: Workshop on Fault Detection and Tolerance in Cryptography, FDTC 2022, Virtual Event/Italy, 16 September 2022, pp. 18–29. IEEE (2022)

    Google Scholar 

  20. Lu, Y.: Attacking hardware AES with DFA. CoRR abs/1902.08693 (2019)

    Google Scholar 

  21. Nasahl, P., et al.: SYNFI: pre-silicon fault analysis of an open-source secure element. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 56–87 (2022)

    Article  Google Scholar 

  22. Piscitelli, R., Bhasin, S., Regazzoni, F.: Fault attacks, injection techniques and tools for simulation. In: 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, DTIS 2015, Napoli, Italy, 21–23 April 2015, pp. 1–6. IEEE (2015)

    Google Scholar 

  23. Porpodas, V.: ZOFI: zero-overhead fault injection tool for fast transient fault coverage analysis. CoRR abs/1906.09390 (2019)

    Google Scholar 

  24. Richter-Brockmann, J., Shahmirzadi, A.R., Sasdrich, P., Moradi, A., Güneysu, T.: FIVER - robust verification of countermeasures against fault injections. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4), 447–473 (2021)

    Article  Google Scholar 

  25. Riscure: Riscure/fisim: An open-source deterministic fault attack simulator prototype. https://github.com/Riscure/FiSim

  26. Roy, I., Rebeiro, C., Hazra, A., Bhunia, S.: SAFARI: automatic synthesis of fault-attack resistant block cipher implementations. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(4), 752–765 (2020)

    Google Scholar 

  27. Saha, S., Alam, M., Bag, A., Mukhopadhyay, D., Dasgupta, P.: Leakage assessment in fault attacks: a deep learning perspective. IACR Cryptology ePrint Archive, p. 306 (2020)

    Google Scholar 

  28. Saha, S., Jap, D., Patranabis, S., Mukhopadhyay, D., Bhasin, S., Dasgupta, P.: Automatic characterization of exploitable faults: a machine learning approach. IEEE Trans. Inf. Forensics Secur. 14(4), 954–968 (2019)

    Article  Google Scholar 

  29. Saha, S., Kumar, S.N., Patranabis, S., Mukhopadhyay, D., Dasgupta, P.: ALAFA: automatic leakage assessment for fault attack countermeasures. In: Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019, Las Vegas, NV, USA, 02–06 June 2019, p. 136. ACM (2019)

    Google Scholar 

  30. Saha, S., Kumar, U., Mukhopadhyay, D., Dasgupta, P.: An automated framework for exploitable fault identification in block ciphers - a data mining approach. In: Kühne, U., Danger, J., Guilley, S. (eds.) PROOFS 2017, 6th International Workshop on Security Proofs for Embedded Systems, Taipei, Taiwan, 29th September 2017. EPiC Series in Computing, vol. 49, pp. 50–67. EasyChair (2017)

    Google Scholar 

  31. Saha, S., Mukhopadhyay, D., Dasgupta, P.: ExpFault: an automated framework for exploitable fault characterization in block ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2), 242–276 (2018)

    Article  Google Scholar 

  32. Simevski, A., Kraemer, R., Krstic, M.: Automated integration of fault injection into the ASIC design flow. In: 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2013, New York City, NY, USA, 2–4 October 2013, pp. 255–260. IEEE Computer Society (2013)

    Google Scholar 

  33. Srivastava, M., Slpsk, P., Roy, I., Rebeiro, C., Hazra, A., Bhunia, S.: SOLOMON: an automated framework for detecting fault attack vulnerabilities in hardware. In: 2020 Design, Automation & Test in Europe Conference & Exhibition, DATE 2020, Grenoble, France, 9–13 March 2020, pp. 310–313. IEEE (2020)

    Google Scholar 

  34. Timmers, N., Mune, C.: Escalating privileges in Linux using voltage fault injection. In: 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2017, Taipei, Taiwan, 25 September 2017, pp. 1–8. IEEE Computer Society (2017)

    Google Scholar 

  35. Timmers, N., Spruyt, A., Witteman, M.: Controlling PC on ARM using fault injection. In: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016, Santa Barbara, CA, USA, 16 August 2016, pp. 25–35. IEEE Computer Society (2016)

    Google Scholar 

  36. Wiersma, N., Pareja, R.: Safety != security: on the resilience of ASIL-D certified microcontrollers against fault injection attacks. In: 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2017, Taipei, Taiwan, 25 September 2017, pp. 9–16. IEEE Computer Society (2017)

    Google Scholar 

  37. Wouters, L., den Herrewegen, J.V., Garcia, F.D., Oswald, D.F., Gierlichs, B., Preneel, B.: Dismantling DST80-based immobiliser systems. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2), 99–127 (2020)

    Article  Google Scholar 

Download references

Acknowledgment

This work received funding in the framework of the NWA Cybersecurity Call with project name PROACT with project number NWA.1215.18.014, which is (partly) financed by the Netherlands Organisation for Scientific Research (NWO).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Asmita Adhikary or Ileana Buhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Adhikary, A., Buhan, I. (2023). SoK: Assisted Fault Simulation. In: Zhou, J., et al. Applied Cryptography and Network Security Workshops. ACNS 2023. Lecture Notes in Computer Science, vol 13907. Springer, Cham. https://doi.org/10.1007/978-3-031-41181-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-41181-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-41180-9

  • Online ISBN: 978-3-031-41181-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation