SimpliFI: Hardware Simulation of Embedded Software Fault Attacks

Fault injection simulation on embedded software is typically captured using a high-level fault model that expresses fault behavior in terms of programmer-observable quantities. These fault models hide the true sensitivity of the underlying processor hardware to fault injection, and they are unable t...

Full description

Bibliographic Details
Main Authors: Jacob Grycel, Patrick Schaumont
Format: Article
Language:English
Published: MDPI AG 2021-06-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/5/2/15
id doaj-c5d8eb5cd8694322bb3fb24fd576677a
record_format Article
spelling doaj-c5d8eb5cd8694322bb3fb24fd576677a2021-06-30T23:33:34ZengMDPI AGCryptography2410-387X2021-06-015151510.3390/cryptography5020015SimpliFI: Hardware Simulation of Embedded Software Fault AttacksJacob Grycel0Patrick Schaumont1Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA 01609, USADepartment of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA 01609, USAFault injection simulation on embedded software is typically captured using a high-level fault model that expresses fault behavior in terms of programmer-observable quantities. These fault models hide the true sensitivity of the underlying processor hardware to fault injection, and they are unable to correctly capture fault effects in the programmer-invisible part of the processor microarchitecture. We present SimpliFI, a simulation methodology to test fault attacks on embedded software using a hardware simulation of the processor running the software. We explain the purpose and advantage of SimpliFI, describe automation of the simulation framework, and apply SimpliFI on a BRISC-V embedded processor running an AES application.https://www.mdpi.com/2410-387X/5/2/15fault injectionsoftware vulnerability evaluationhardware simulation
collection DOAJ
language English
format Article
sources DOAJ
author Jacob Grycel
Patrick Schaumont
spellingShingle Jacob Grycel
Patrick Schaumont
SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
Cryptography
fault injection
software vulnerability evaluation
hardware simulation
author_facet Jacob Grycel
Patrick Schaumont
author_sort Jacob Grycel
title SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
title_short SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
title_full SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
title_fullStr SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
title_full_unstemmed SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
title_sort simplifi: hardware simulation of embedded software fault attacks
publisher MDPI AG
series Cryptography
issn 2410-387X
publishDate 2021-06-01
description Fault injection simulation on embedded software is typically captured using a high-level fault model that expresses fault behavior in terms of programmer-observable quantities. These fault models hide the true sensitivity of the underlying processor hardware to fault injection, and they are unable to correctly capture fault effects in the programmer-invisible part of the processor microarchitecture. We present SimpliFI, a simulation methodology to test fault attacks on embedded software using a hardware simulation of the processor running the software. We explain the purpose and advantage of SimpliFI, describe automation of the simulation framework, and apply SimpliFI on a BRISC-V embedded processor running an AES application.
topic fault injection
software vulnerability evaluation
hardware simulation
url https://www.mdpi.com/2410-387X/5/2/15
work_keys_str_mv AT jacobgrycel simplifihardwaresimulationofembeddedsoftwarefaultattacks
AT patrickschaumont simplifihardwaresimulationofembeddedsoftwarefaultattacks
_version_ 1721351037832396800