Abstract

To protect against hardware fault attacks, developers can use software countermeasures. They are generally designed to thwart software fault models such as instruction skip or memory corruption. However, these typical models do not take into account the actual implementation of a processor. By analyzing the processor microarchitecture, it is possible to bypass typical software countermeasures. In this paper, we analyze the vulnerability of a secure code from FISSC (Fault Injection and Simulation Secure Collection), by simulating fault injections in a RISC-V Rocket processor RTL description. We highlight the importance of hidden registers in the processor pipeline, which temporarily hold data during code execution. Secret data can be leaked by attacking these hidden registers. Software countermeasures against such attacks are also proposed.


Original document

The different versions of the original document can be found in:

http://dx.doi.org/10.23919/date.2019.8715158
https://doi.org/10.23919/DATE.2019.8715158,
https://ieeexplore.ieee.org/document/8715158,
http://doi.org/10.23919/DATE.2019.8715158,
https://academic.microsoft.com/#/detail/2944835877
Back to Top

Document information

Published on 01/01/2019

Volume 2019, 2019
DOI: 10.23919/date.2019.8715158
Licence: CC BY-NC-SA license

Document Score

0

Views 0
Recommendations 0

Share this document

claim authorship

Are you one of the authors of this document?