Defending the Citadel: Fault Injection Attacks Against Dynamic Information Flow Tracking and Related Countermeasures
| Authors |
|
|---|---|
| Publication date | 2024 |
| Host editors |
|
| Book title | 2024 IEEE Computer Society Annual Symposium on VLSI : ISVLSI 2024 |
| Book subtitle | Emerging VLSI technologies and architectures : Knoxville, USA, July 1-3, 2024 : proceedings |
| ISBN |
|
| ISBN (electronic) |
|
| Event | 2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) |
| Pages (from-to) | 180-185 |
| Publisher | Piscataway, NJ: IEEE Computer Society |
| Organisations |
|
| Abstract |
Embedded processors are key components of Internet of Things (IoT) devices of Cyber-Physical Systems (CPSs) that manipulate sensitive data. In order to mitigate software attacks, hardware-assisted Dynamic Information Flow Tracking (DIFT) has been integrated into embedded processors. Due to their proximity to attackers, IoT devices are also exposed to physical attacks such as Fault Injection Attacks (FIAs). In this paper, we protect DIFT from fault injection attacks by extending current DIFT support with fault detection and correction capabilities. To do so, we design, implement and evaluate two countermeasures based on parity bit or Hamming code to protect DIFT-related registers of RISC-V CPUs. Our experimental results, obtained using the D-RI5CY processor as a use case, show a 100 % fault detection and fault correction when relying on a Hamming code-based protection and a low area overhead (10.6%) compared to the original design.
|
| Document type | Conference contribution |
| Language | English |
| Published at | https://doi.org/10.1109/isvlsi61997.2024.00042 |
| Other links | https://www.proceedings.com/76390.html |
| Downloads |
Defending the Citadel
(Final published version)
|
| Permalink to this page | |