【24h】

Memory Address Scrambling Revealed Using Fault Attacks

机译:使用故障攻击揭示内存地址加扰

获取原文

摘要

Todayȁ9;s trend in the smart card industry is to move from ROM+EEPROM chips to Flash-only products. Recent publications have illustrated the vulnerability of Floating Gate memories to UV and heat radiation. In this paper, we explain how, by using low cost means, such a vulnerability can be used to modify specific data within an EEPROM memory even in the presence of a given type of counter-measure. Using simple means, we devise a fault injection tool that consistently causes predictable modifications of the targeted memoriesȁ9; contents by flipping ȁ8;1ȁ9;s to ȁ8;0ȁ9;s. By mastering the location of those modifications, we illustrate how we can reverse-engineer a simple address scrambling mechanism in a white box analysis of a given EEPROM. Such an approach can be used to test the security of Floating Gate memories used in security devices like smart cards. We also explain how to prevent such attacks and we propose some counter-measures that can be either implemented on the hardware level by chip designers or on the software level in the Operating System interacting with those memories.
机译:如今,智能卡行业的9大趋势是从ROM + EEPROM芯片转向仅闪存产品。最近的出版物说明了浮栅存储器对紫外线和热辐射的脆弱性。在本文中,我们解释了即使存在给定类型的对策,也可以通过低成本手段利用这种漏洞来修改EEPROM存储器中的特定数据。我们使用简单的方法设计了一种故障注入工具,该工具能够始终如一地对目标存储器进行可预测的修改[9]。将ȁ8;1ȁ9; s翻转为ȁ8;0ȁ9; s来显示内容。通过掌握这些修改的位置,我们说明了如何在给定EEPROM的白盒分析中对简单的地址加扰机制进行反向工程。这种方法可用于测试在安全设备(如智能卡)中使用的Floating Gate存储器的安全性。我们还解释了如何防止此类攻击,并提出了一些对策,这些对策可以在硬件级别由芯片设计人员实施,也可以在与这些内存进行交互的操作系统中的软件级别实施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号