Map-based analysis of IEMI fault injection into cryptographic devices

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Fault injection based on intentional electromagnetic interference (IEMI) is attracting considerable attention in the field of physical attacks on cryptographic devices due to its non-contact and non-invasive nature. This paper explores the relations between injection intensity and fault occurrence during IEMI-based fault injection. The basic idea in this type of attack is to generate a map of the effect of such fault injection for different frequencies. Based on the maps generated for an evaluation board, we demonstrate how an injected EM wave propagates across the board depending on its intensity and frequency. We also demonstrate in detail the propagation of induced EM waves inside the target module (i.e., a cryptographic LSI chip) and other modules. Through a map generation experiment, we examine the conditions under which transient faults suitable for attacks are generated in the cryptographic module. In addition, we discuss a possible countermeasure against IEMI-based fault injection.

Original languageEnglish
Title of host publicationProceedings - 2013 IEEE International Symposium on Electromagnetic Compatibility, EMC 2013
Pages829-833
Number of pages5
DOIs
Publication statusPublished - 2013 Dec 1
Event2013 IEEE International Symposium on Electromagnetic Compatibility, EMC 2013 - Denver, CO, United States
Duration: 2013 Aug 52013 Aug 9

Publication series

NameIEEE International Symposium on Electromagnetic Compatibility
ISSN (Print)1077-4076
ISSN (Electronic)2158-1118

Other

Other2013 IEEE International Symposium on Electromagnetic Compatibility, EMC 2013
CountryUnited States
CityDenver, CO
Period13/8/513/8/9

ASJC Scopus subject areas

  • Condensed Matter Physics
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Map-based analysis of IEMI fault injection into cryptographic devices'. Together they form a unique fingerprint.

Cite this