Volume 51 Issue 1
Jan.  2025
Turn off MathJax
Article Contents
LIU Q,LI Y K. Configurable fault injection detection method for RISC-V based on instruction extension[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(1):43-52 (in Chinese) doi: 10.13700/j.bh.1001-5965.2022.0995
Citation: LIU Q,LI Y K. Configurable fault injection detection method for RISC-V based on instruction extension[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(1):43-52 (in Chinese) doi: 10.13700/j.bh.1001-5965.2022.0995

Configurable fault injection detection method for RISC-V based on instruction extension

doi: 10.13700/j.bh.1001-5965.2022.0995
Funds:

National Natural Science Foundation of China (61974102) 

More Information
  • Corresponding author: E-mail:qiangliu@tju.edu.cn
  • Received Date: 15 Dec 2022
  • Accepted Date: 24 Feb 2023
  • Available Online: 10 Mar 2023
  • Publish Date: 09 Mar 2023
  • For data flow errors caused by fault attacks during processor operation, this paper designed a configurable fault injection detection method based on RISC-V processor microarchitecture. Based on the RISC-V instruction set architecture, this method took advantage of its expandability to add custom arithmetic logic instructions with mode configuration and control and state registers and realized the arithmetic logic operation and fault detection simultaneously by the combination of hardware and software. At the software level, configuration information was written to the customized control and state register by register access instructions to configure the fault detection modes of the customized instructions, including information and temporal redundancy modes and their parameters. At the hardware level, a RISC-V processor microarchitecture supporting configurable fault injection detection was implemented. Finally, the simulator command was used to simulate the fault injection, and the functional correctness and fault injection detection capability of the extended RISC-V processor were verified. The experimental results show that compared to the single information redundancy method, when the information redundancy mode and temporal redundancy mode are applied with the same frequency, the proposed configurable method improves the average fault detection rate by 13.34% with an average resource overhead of 4.4%. Compared to the single temporal redundancy method, it reduces the average time overhead by 8.24% with a 13.33% decrease in fault detection rate. The proposed configurable method can achieve a compromise between fault detection rate and time overhead and be applied in application scenarios with different security and performance requirements.

     

  • loading
  • [1]
    王省欣, 胡伟, 谭静, 等. AES相关故障注入攻击[J]. 西安电子科技大学学报, 2021, 48(4): 192-199.

    WANG X X, HU W, TAN J, et al. Correlation fault attack on AES[J]. Journal of Xidian University, 2021, 48(4): 192-199(in Chinese).
    [2]
    TROUCHKINE T, BUKASA S K, ESCOUTELOUP M, et al. Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models[J]. Journal of Cryptographic Engineering, 2021, 11(4): 353-367. doi: 10.1007/s13389-021-00259-6
    [3]
    姜会龙, 朱翔, 李悦, 等. 基于微控制器的AES激光注入攻击研究[J]. 电子与信息学报, 2021, 43(5): 1357-1364. doi: 10.11999/JEIT200163

    JIANG H L, ZHU X, LI Y, et al. Research on laser injection attack for AES based on micro-controller unit[J]. Journal of Electronics & Information Technology, 2021, 43(5): 1357-1364(in Chinese). doi: 10.11999/JEIT200163
    [4]
    VASSELLE A, THIEBEAULD H, MAOUHOUB Q, et al. Laser-induced fault injection on smartphone bypassing the secure boot[C]//Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography. Piscataway: IEEE Press, 2017: 41-48.
    [5]
    NASHIMOTO S, SUZUKI D, UENO R, et al. Bypassing isolated execution on RISC-V using side-channel-assisted fault-injection and its countermeasure[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2022(1): 28-68.
    [6]
    YUCE B, GHALATY N F, DESHPANDE C, et al. FAME: Fault-attack aware microprocessor extensions for hardware fault detection and software fault response[C]//Proceedings of the Hardware and Architectural Support for Security and Privacy. New York: ACM, 2016: 1-8.
    [7]
    BREIER J, BHASIN S, HE W. An electromagnetic fault injection sensor using Hogge phase-detector[C]//Proceedings of the 18th International Symposium on Quality Electronic Design. Piscataway: IEEE Press, 2017: 307-312.
    [8]
    DESHPANDE C, YUCE B, GHALATY N F, et al. A configurable and lightweight timing monitor for fault attack detection[C]//Proceedings of the IEEE Computer Society Annual Symposium on VLSI. Piscataway: IEEE Press, 2016: 461-466.
    [9]
    王沛晶, 刘强. 一种混合粒度奇偶校验故障注入检测方法[J]. 北京亚洲成人在线一二三四五六区学报, 2019, 45(4): 821-826.

    WANG P J, LIU Q. Mixed-grain parity-code-based fault detection method against fault injection[J]. Journal of Beijing University of Aeronautics and Astronautics, 2019, 45(4): 821-826(in Chinese).
    [10]
    MANSSOUR N A, LAPÔTRE V, GOGNIAT G, et al. Processor extensions for hardware instruction replay against fault injection attacks[C]//Proceedings of the 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems. Piscataway: IEEE Press, 2022: 26-31.

    MANSSOUR N A, LAPÔTRE V, GOGNIAT G, et al. Processor extensions for hardware instruction replay against fault injection attacks[C]//Proceedings of the 25th International Symposium on Design and Diagnostics of Electronic Circuits and Systems. Piscataway: IEEE Press, 2022: 26-31.
    [11]
    邓丁, 郭阳. 面向RISC-V内核的标记指令复算与纠错机制的设计[J]. 国防科技大学学报, 2020, 42(6): 90-97.

    DENG D, GUO Y. Recomputation and correction mechanism design for tagged instructions of the RISC-V core[J]. Journal of National University of Defense Technology, 2020, 42(6): 90-97(in Chinese).
    [12]
    WATERMAN A S. Design of the RISC-V instruction set architecture[D]. Berkeley: University of California, Berkeley, 2016.
    [13]
    PARHAMI B. Computer arithmetic: Algorithms and hardware designs[M]. New York: Oxford University Press, 2000.
    [14]
    DESHPANDE C, YUCE B, NAZHANDALI L, et al. Employing dual-complementary flip-flops to detect EMFI attacks[C]//Proceedings of the Asian Hardware Oriented Security and Trust Symposium. Piscataway: IEEE Press, 2017: 109-114.
    [15]
    NICOLAIDIS M. Carry checking/parity prediction adders and ALUs[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2003, 11(1): 121-128. doi: 10.1109/TVLSI.2002.800526
    [16]
    NAHIYAN A, FARAHMANDI F, MISHRA P, et al. Security-aware FSM design flow for identifying and mitigating vulnerabilities to fault attacks[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2019, 38(6): 1003-1016. doi: 10.1109/TCAD.2018.2834396
    [17]
    DUREUIL L, PETIOT G, POTET M L, et al. FISSC: A fault injection and simulation secure collection[C]//Proceedings of the International Conference on Computer Safety, Reliability, and Security. Berlin: Springer, 2016: 3-11.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(13)  / Tables(2)

    Article Metrics

    Article views(614) PDF downloads(16) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return