(Created page with " == Abstract == To protect against hardware fault attacks, developers can use software countermeasures. They are generally designed to thwart software fault models such as in...") |
m (Scipediacontent moved page Draft Content 488742696 to Laurent et al 2019a) |
(No difference)
|
To protect against hardware fault attacks, developers can use software countermeasures. They are generally designed to thwart software fault models such as instruction skip or memory corruption. However, these typical models do not take into account the actual implementation of a processor. By analyzing the processor microarchitecture, it is possible to bypass typical software countermeasures. In this paper, we analyze the vulnerability of a secure code from FISSC (Fault Injection and Simulation Secure Collection), by simulating fault injections in a RISC-V Rocket processor RTL description. We highlight the importance of hidden registers in the processor pipeline, which temporarily hold data during code execution. Secret data can be leaked by attacking these hidden registers. Software countermeasures against such attacks are also proposed.
The different versions of the original document can be found in:
Published on 01/01/2019
Volume 2019, 2019
DOI: 10.23919/date.2019.8715158
Licence: CC BY-NC-SA license
Are you one of the authors of this document?