Practical, Low-Cost Fault Injection Attacks on Personal Smart Devices

Shaked Delarea, Yossi Oren

Research output: Contribution to journalArticlepeer-review

Abstract

Fault attacks are traditionally considered under a threat model that assumes the device under test is in the possession of the attacker. We propose a variation on this model. In our model, the attacker integrates a fault injection circuit into a malicious field-replaceable unit, or FRU, which is later placed by the victim in close proximity to their own device. Examples of devices which incorporate FRUs include interface cards in routers, touch screens and sensor assemblies in mobile phones, ink cartridges in printers, batteries in health sensors, and so on. FRUs are often installed by after-market repair technicians without properly verifying their authenticity, and previous works have shown they can be used as vectors for various attacks on the privacy and integrity of smart devices. We design and implement a low-cost fault injection circuit suitable for placement inside a malicious FRU, and show how it can be used to practically extract secrets from a privileged system process through a combined hardware-software approach, even if the attacker software application only has user-level permissions. Our prototype produces highly effective and repeatable attacks, despite its cost being several orders of magnitude less than that of commonly used fault injection analysis lab setups. This threat model allows fault attacks to be carried out remotely, even if the device under test is in the hands of the victim. Considered together with recent advances in software-only fault attacks, we argue that resistance to fault attacks should be built into additional classes of devices.

Original languageEnglish
Article number417
JournalApplied Sciences (Switzerland)
Volume12
Issue number1
DOIs
StatePublished - 1 Jan 2022

Keywords

  • Cryptography
  • Fault injection
  • Fault injection attacks
  • Hardware attacks

ASJC Scopus subject areas

  • Materials Science (all)
  • Instrumentation
  • Engineering (all)
  • Process Chemistry and Technology
  • Computer Science Applications
  • Fluid Flow and Transfer Processes

Fingerprint

Dive into the research topics of 'Practical, Low-Cost Fault Injection Attacks on Personal Smart Devices'. Together they form a unique fingerprint.

Cite this