SOLOMON: An Automated Framework for Detecting Fault Attack Vulnerabilities in Hardware

Fault attacks are potent physical attacks on crypto-devices. A single fault injected during encryption can reveal the cipher's secret key. In a hardware realization of an encryption algorithm, only a tiny fraction of the gates is exploitable by such an attack. Finding these vulnerable gates has...

Full description

Saved in:
Bibliographic Details
Published inProceedings - Design, Automation, and Test in Europe Conference and Exhibition pp. 310 - 313
Main Authors Srivastava, Milind, SLPSK, Patanjali, Roy, Indrani, Rebeiro, Chester, Hazra, Aritra, Bhunia, Swarup
Format Conference Proceeding
LanguageEnglish
Published EDAA 01.03.2020
Subjects
Online AccessGet full text
ISSN1558-1101
DOI10.23919/DATE48585.2020.9116380

Cover

More Information
Summary:Fault attacks are potent physical attacks on crypto-devices. A single fault injected during encryption can reveal the cipher's secret key. In a hardware realization of an encryption algorithm, only a tiny fraction of the gates is exploitable by such an attack. Finding these vulnerable gates has been a manual and tedious task requiring considerable expertise. In this paper, we propose SOLOMON, the first automatic fault attack vulnerability detection framework for hardware designs. Given a cipher implementation, either at RTL or gate-level, SOLOMON uses formal methods to map vulnerable regions in the cipher algorithm to specific locations in the hardware thus enabling targeted countermeasures to be deployed with much lesser overheads. We demonstrate the efficacy of the SOLOMON framework using three ciphers: AES, CLEFIA, and Simon.
ISSN:1558-1101
DOI:10.23919/DATE48585.2020.9116380