AVFSM
- 5 June 2016
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 89-89:6
- https://doi.org/10.1145/2897937.2897992
Abstract
A finite state machine (FSM) is responsible for controlling the overall functionality of most digital systems and, therefore, the security of the whole system can be compromised if there are vulnerabilities in the FSM. These vulnerabilities can be created by improper designs or by the synthesis tool which introduces additional don't-care states and transitions during the optimization and synthesis process. An attacker can utilize these vulnerabilities to perform fault injection attacks or insert malicious hardware modifications (Trojan) to gain unauthorized access to some specific states. To our knowledge, no systematic approaches have been proposed to analyze these vulnerabilities in FSM. In this paper, we develop a framework named Analyzing Vulnerabilities in FSM (AVFSM) which extracts the state transition graph (including the don't-care states and transitions) from a gate-level netlist using a novel Automatic Test Pattern Generation (ATPG) based approach and quantifies the vulnerabilities of the design to fault injection and hardware Trojan insertion. We demonstrate the applicability of the AVFSM framework by analyzing the vulnerabilities in the FSM of AES and RSA encryption module. We also propose a low-cost mitigation technique to make FSM more secure against these attacks.Keywords
This publication has 13 references indexed in Scilit:
- Leakage Assessment MethodologyPublished by Springer Science and Business Media LLC ,2015
- TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Designing Trusted Embedded Systems from Finite State MachinesACM Transactions on Embedded Computing Systems, 2014
- Analyzing circuit vulnerability to hardware Trojan insertion at the behavioral levelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Trustworthy Hardware: Identifying and Classifying Hardware TrojansComputer, 2010
- Sequential Circuit Design for Embedded Cryptographic Applications Resilient to Adversarial FaultsInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2007
- Scan design and secure chip [secure IC testing]Published by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- Differential fault analysis of secret key cryptosystemsLecture Notes in Computer Science, 1997
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsLecture Notes in Computer Science, 1996