SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
Fault injection simulation on embedded software is typically captured using a high-level fault model that expresses fault behavior in terms of programmer-observable quantities. These fault models hide the true sensitivity of the underlying processor hardware to fault injection, and they are unable t...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-06-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | https://www.mdpi.com/2410-387X/5/2/15 |
id |
doaj-c5d8eb5cd8694322bb3fb24fd576677a |
---|---|
record_format |
Article |
spelling |
doaj-c5d8eb5cd8694322bb3fb24fd576677a2021-06-30T23:33:34ZengMDPI AGCryptography2410-387X2021-06-015151510.3390/cryptography5020015SimpliFI: Hardware Simulation of Embedded Software Fault AttacksJacob Grycel0Patrick Schaumont1Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA 01609, USADepartment of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA 01609, USAFault injection simulation on embedded software is typically captured using a high-level fault model that expresses fault behavior in terms of programmer-observable quantities. These fault models hide the true sensitivity of the underlying processor hardware to fault injection, and they are unable to correctly capture fault effects in the programmer-invisible part of the processor microarchitecture. We present SimpliFI, a simulation methodology to test fault attacks on embedded software using a hardware simulation of the processor running the software. We explain the purpose and advantage of SimpliFI, describe automation of the simulation framework, and apply SimpliFI on a BRISC-V embedded processor running an AES application.https://www.mdpi.com/2410-387X/5/2/15fault injectionsoftware vulnerability evaluationhardware simulation |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jacob Grycel Patrick Schaumont |
spellingShingle |
Jacob Grycel Patrick Schaumont SimpliFI: Hardware Simulation of Embedded Software Fault Attacks Cryptography fault injection software vulnerability evaluation hardware simulation |
author_facet |
Jacob Grycel Patrick Schaumont |
author_sort |
Jacob Grycel |
title |
SimpliFI: Hardware Simulation of Embedded Software Fault Attacks |
title_short |
SimpliFI: Hardware Simulation of Embedded Software Fault Attacks |
title_full |
SimpliFI: Hardware Simulation of Embedded Software Fault Attacks |
title_fullStr |
SimpliFI: Hardware Simulation of Embedded Software Fault Attacks |
title_full_unstemmed |
SimpliFI: Hardware Simulation of Embedded Software Fault Attacks |
title_sort |
simplifi: hardware simulation of embedded software fault attacks |
publisher |
MDPI AG |
series |
Cryptography |
issn |
2410-387X |
publishDate |
2021-06-01 |
description |
Fault injection simulation on embedded software is typically captured using a high-level fault model that expresses fault behavior in terms of programmer-observable quantities. These fault models hide the true sensitivity of the underlying processor hardware to fault injection, and they are unable to correctly capture fault effects in the programmer-invisible part of the processor microarchitecture. We present SimpliFI, a simulation methodology to test fault attacks on embedded software using a hardware simulation of the processor running the software. We explain the purpose and advantage of SimpliFI, describe automation of the simulation framework, and apply SimpliFI on a BRISC-V embedded processor running an AES application. |
topic |
fault injection software vulnerability evaluation hardware simulation |
url |
https://www.mdpi.com/2410-387X/5/2/15 |
work_keys_str_mv |
AT jacobgrycel simplifihardwaresimulationofembeddedsoftwarefaultattacks AT patrickschaumont simplifihardwaresimulationofembeddedsoftwarefaultattacks |
_version_ |
1721351037832396800 |