Instruction duplication: Leaky and not too fault-tolerant!

Lucian Cojocar*, Kostas Papagiannopoulos, Niek Timmers

*Corresponding author for this work

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

Fault injection attacks alter the intended behavior of micro-controllers, compromising their security. These attacks can be mitigated using software countermeasures. A widely-used software-based solution to deflect fault attacks is instruction duplication and n -plication. We explore two main limitations with these approaches: first, we examine the effect of instruction duplication under fault attacks, demonstrating that as fault tolerance mechanism, code duplication does not provide a strong protection in practice. Second, we show that instruction duplication increases side-channel leakage of sensitive code regions using a multivariate exploitation technique both in theory and in practice.

Original languageEnglish
Title of host publicationSmart Card Research and Advanced Applications - 16th International Conference, CARDIS 2017,Revised Selected Papers
PublisherSpringer/Verlag
Pages160-179
Number of pages20
ISBN (Electronic)9783319752082
ISBN (Print)9783319752075
DOIs
Publication statusPublished - 2018
Event16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017 - Lugano, Switzerland
Duration: 13 Nov 201715 Nov 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10728 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th International Conference on Smart Card Research and Advanced Applications, CARDIS 2017
Country/TerritorySwitzerland
CityLugano
Period13/11/1715/11/17

Fingerprint

Dive into the research topics of 'Instruction duplication: Leaky and not too fault-tolerant!'. Together they form a unique fingerprint.

Cite this