CAD for Assurance of Electronic Systems
 

FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers

By: Keerthi K (IIT Madras), Indrani Roy (IIT Madras) , Chester Rebeiro (IIT Madras), Aritra Hazra (IIT Kharagpur), and Swarup Bhunia (University of Florida)

Stage: RTL, HDL

Summary

FEDS is an automated fault attack exploitability detection tool that works on software implementation of block ciphers. FEDS can automatically map vulnerable locations (output of XFC) tools like XFC to software implementation of the block ciphers and then finds all the possible fault exploitable instructions at the IR level using a LLVM parser. FEDS can also provide appropriate countermeasures at the IR level and generate fault attack resistant executables. Details about input and output are given in the folder.

Contact

Keerti K

Input/Output Interface

  • Input: Block Cipher Specification and software Implementation of Block Cipher
  • Output: All fault exploitable instructions that can retrieve the key with complexity provided by HLE Tools like XFC

Dependencies

LLVM, CBMC, python

Licensing Info

Copyright (c) 2013-2014, Indian Institute of Technology Madras (IIT Madras) All rights reserved.

References

K, Keerthi; Roy, Indrani; Rebeiro, Chester; Hazra, Aritra; Bhunia, Swarup

FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers Journal Article

In: IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2020, no. 2, pp. 272-299, 2020.

Abstract | Links | BibTeX

Acknowledgments

  • We would like to thank the Ministry of Electronics and Information Technology (MeitY), India, DIST-FIST Grant Program 2016, from Department of Science and Technology, India and Cisco Grant Program 2018 for partially funding this project