RNN-based Detection of Fault Attacks on RSA

Conference Paper (2020)
Author(s)

T.C. Köylü (TU Delft - Computer Engineering)

Cezar Rodolfo Wedig Reinbrecht (TU Delft - Computer Engineering)

Said Hamdioui (TU Delft - Quantum & Computer Engineering)

M. Taouil (TU Delft - Computer Engineering)

Research Group
Computer Engineering
Copyright
© 2020 T.C. Köylü, Cezar Reinbrecht, S. Hamdioui, M. Taouil
DOI related publication
https://doi.org/10.1109/ISCAS45731.2020.9180708
More Info
expand_more
Publication Year
2020
Language
English
Copyright
© 2020 T.C. Köylü, Cezar Reinbrecht, S. Hamdioui, M. Taouil
Research Group
Computer Engineering
Pages (from-to)
1-5
ISBN (print)
978-1-7281-3321-8
ISBN (electronic)
978-1-7281-3320-1
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Physical fault injection attacks are becoming an important threat to computer systems, as fault injection equipment becomes more and more accessible. In this work, we propose a new strategy to detect fault attacks in cryptosystems. We use a recurrent neural network (RNN) to detect problems in the program flow caused by injected faults. Our neural network is trained using the instructions of non-faulty operations and therefore, it can protect against both current and future attacks. As a case study, we use two implementations of software RSA. To test the effectiveness of our detector, we propose a collection of fault injection models, where each model represents different types of faults in the instructions. Evaluation results show that we obtain a high detection accuracy in case injected faults lead to changes in the instruction flow and hence, making it difficult to steal secrete keys. Finally, we propose an efficient hardware implementation with only a 6% area overhead compared to a RISC-V processor.

Files

License info not available