首页> 外文会议>International Conference on Emerging Security Technologies >Vulnerability of secured IoT memory against localized back side laser fault injection
【24h】

Vulnerability of secured IoT memory against localized back side laser fault injection

机译:安全的IoT内存针对本地背面激光故障注入的漏洞

获取原文

摘要

Devices aimed for the Internet of Things (loT) market are required to be both low cost and highly secured, as they are expected to be integrated in ordinary "things" while storing and processing sensitive information. In this paper we examine the vulnerabilities of a commercial secured IoT memory chip to precise and localized back-side laser fault injection. We explain the different steps needed in order to prepare the sample, and describe the laser fault injection setup. From the experiments we conclude that the chip relies mostly on physical countermeasures which renders obsolete in this kind of attack. Further more, the experiments stress the necessity for sophisticated Error Detecting Codes in order to efficiently protect the integrity of the sensitive information stored and processed in the chip.
机译:面向物联网(loT)市场的设备既需要低成本又需要高度安全,因为它们希望在存储和处理敏感信息时集成到普通的“事物”中。在本文中,我们研究了商业安全的IoT存储器芯片对精确和本地化的背面激光故障注入的脆弱性。我们解释了准备样品所需的不同步骤,并描述了激光故障注入装置。从实验中我们可以得出结论,该芯片主要依赖于物理对策,因此在这种攻击中已经过时了。此外,实验强调了复杂的错误检测代码的必要性,以便有效地保护芯片中存储和处理的敏感信息的完整性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号