Abstract
Innovation cycles have been shortening significantly during the last years. This process puts tremendous pressure on designers of embedded systems for security-or reliability-critical applications. Eventual design problems not detected during design time can lead to lost money, confidentiality, or even loss of life in extreme cases. Therefore it is of vital importance to evaluate a new system for its robustness against intentionally and random induced operational faults. Currently this is generally done using extensive simulation runs using gate-level models or direct measurements on the finished silicon product. These approaches either need a significant amount of time and computational power for these simulations or rely on existing product samples.
This article presents a novel system evaluation platform using power emulation and fault injection techniques to provide an additional tool for developers of embedded systems in security-and reliability-critical fields. Faults are emulated using state-of-the-art fault injection methods and a flexible pattern representation approach. The resulting effects of these faults on the power consumption profile are estimated using state-of-the-art power emulation hardware. A modular system augmentation approach provides emulation flexibility similar to fault simulation implementations. The platform enables the efficient evaluation of new hardware or software implementations of critical security or reliability solutions at an early development phase.
- Aeroflex Gaisler. 2010. LEON3 processor. http://www.gaisler.com/.Google Scholar
- Antoni, L., Leveugle, R., and Feher, M. 2002. Using run-time reconfiguration for fault injection in hardware prototypes. In Proceedings of the 17th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT’02). IEEE, 245--253. Google Scholar
Digital Library
- Arlat, J., Aguera, M., Amat, L., Crouzet, Y., Fabre, J.-C., Laprie, J.-C., Martins, E., and Powell, D. 1990. Fault injection for dependability validation: A methodology and some applications. IEEE Trans. Softw. Engin. 16, 2, 166--182. Google Scholar
Digital Library
- Arlat, J., Aguera, M., Amat, L., Crouzet, Y., Fabre, J., Laprie, J., Martins, E., and Powell, D. 2002. Fault injection for dependability validation: A methodology and some applications. IEEE Trans. Softw. Engin. 16, 2, 166--182. Google Scholar
Digital Library
- Bachmann, C., Genser, A., Steger, C., Weiss, R., and Haid, J. 2010. Automated power characterization for run-time power emulation of SoC designs. In Proceedings of the Euromicro Symposium on Digital System Design (DSD’10). 587--594. Google Scholar
Digital Library
- Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., and Whelan, C. 2006. The sorcerer’s apprentice guide to fault attacks. Proc. IEEE 94, 2, 370--382.Google Scholar
- Baraza, J., Gracia, J., Gil, D., and Gil, P. 2006. Improvement of fault injection techniques based on VHDL code modification. In Proceedings of the IEEE 10th International High-Level Design Validation and Test Workshop. IEEE, 19--26. Google Scholar
Digital Library
- Baraza, J. C., Gracia, J., Gil, D., and Gil, P. J. 2002. A prototype of a vhdl-based fault injection tool: Description and application. J. Syst. Archit. 47, 10, 847--867. Google Scholar
Digital Library
- Benini, L., Macii, A., Macii, E., Omerbegovic, E., Pro, F., and Poncino, M. 2003. Energy-Aware design techniques for differential power analysis protection. In Proceedings of the 40th Annual Design Automation Conference (DAC’03). ACM Press, New York, 36--41. Google Scholar
Digital Library
- Bhattacharjee, A., Contreras, G., and Martonosi, M. 2008. Full-System chip multiprocessor power evaluations using fpga-based emulation. In Proceedings of the International Symposium on Low Power Electronics and Design (ISLPED’08). Google Scholar
Digital Library
- Brier, E., Clavier, C., and Olivier, F. 2004. Correlation power analysis with a leakage model. Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES’04). Lecture Notes in Computer Science, vol. 3156, Springer, 135--152.Google Scholar
- Bucci, M., Luzzi, R., Menichelli, F., Menicocci, R., Olivieri, M., and Trifiletti, A. 2007. Testing power-analysis attack susceptibility in register-transfer level designs. Inf. Secur. 1, 3, 128--133.Google Scholar
Cross Ref
- Civera, P., Macchiarulo, L., Rebaudengo, M., Reorda, M., and Violante, M. 2002. Exploiting circuit emulation for fast hardness evaluation. IEEE Trans. Nucl. Sci. 48, 6, 2210--2216.Google Scholar
Cross Ref
- Coburn, J., Ravi, S., and Raghunathan, A. 2005. Power emulation: A new paradigm for power estimation. In Proceedings of the Design Automation Conference (DAC’05). 700--705. Google Scholar
Digital Library
- Daveau, J., Blampey, A., Gasiot, G., Bulone, J., and Roche, P. 2009. An industrial fault injection platform for soft-error dependability analysis and hardening of complex system-on-a-chip. In Proceedings of the 20th IEEE International Reliability Physics Symposium. IEEE, 212--220.Google Scholar
- den Hartog, J. and de Vink, E. 2005. Virtual analysis and reduction of side-channel vulnerabilities of smartcards. In Formal Aspects in Security and Trust. Springer, 85--98.Google Scholar
- Genser, A., Bachmann, C., Haid, J., Steger, C., and Weiss, R. 2009. An emulation-based real-time power profiling unit for embedded software. In Proceedings of the International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (SAMOS’09). 67--73. Google Scholar
Digital Library
- Ghodrat, M., Lahiri, K., and Raghunathan, A. 2007. Accelerating system-on-chip power analysis using hybrid power estimation. In Proceedings of the 44th ACM/IEEE Design Automation Conference (DAC’07). 883--886. Google Scholar
Digital Library
- Grinschgl, J., Krieg, A., Steger, C., Weiss, R., Bock, H., and Haid, J. 2011a. Automatic saboteur placement for emulation-based multi-bit fault injection. In Proceedings of the 6th International Workshop on Reconfigurable Communication-Centric Systems-on-Chip (ReCoSoC’11). 1--8.Google Scholar
- Grinschgl, J., Krieg, A., Steger, C., Weiss, R., Bock, H., and Haid, J. 2011b. Modular fault injector for multiple fault dependability and security evaluations. In Proceedings of the 14th Euromicro Conference on Digital System Design (DSD’11). IEEE, 550--557. Google Scholar
Digital Library
- Gunneflo, U., Karlsson, J., and Torin, J. 2002. Evaluation of error detection schemes using fault injection by heavy-ion radiation. In Proceedings of the 19th International Symposium on Fault-Tolerant Computing (FTCS’02) Digest of Papers. IEEE, 340--347.Google Scholar
- Jenn, E., Arlat, J., Rimen, M., Ohlsson, J., and Karlsson, J. 1994. Fault injection into vhdl models: The mefisto tool. In Proceedings of the 24th International Symposium on Fault-Tolerant Computing (FTCS’94) Digest of Papers. IEEE, 66--75.Google Scholar
- Jenn, E., Arlat, J., Rimén, M., Ohlsson, J., and Karlsson, J. 2002. Fault injection into VHDL models: The MEFISTO tool. In Proceedings of the 24th International Symposium on Fault-Tolerant Computing (FTCS’02) Digest of Papers. IEEE, 66--75.Google Scholar
- Kafka, L. 2008. Analysis of applicability of partial runtime reconfiguration in fault emulator in Xilinx fpgas. In Proceedings of the 11th IEEE Workshop on Design and Diagnostics of Electronic Circuits and Systems (DDECS’08). IEEE, 1--4. Google Scholar
Digital Library
- Kocher, P., Jaffe, J., and Jun, B. 1999. Differential power analysis. In Proceedings of the Annual Cryptology Conference (CRYPTO’99). Springer. Google Scholar
Digital Library
- Krieg, A., Bachmann, C., Grinschgl, J., Steger, C., and Weiss, R. 2011a. Accelerating early design phase differential power analysis using power emulation techniques. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’11). 81--86.Google Scholar
- Krieg, A., Grinschgl, J., Steger, C., Weiss, R., Bock, H., and Haid, J. 2011b. Run-time FPGA health monitoring using power emulation techniques. In Proceedings of the 54th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS’11). IEEE, 1--4.Google Scholar
- Krieg, A., Grinschgl, J., Steger, C., Weiss, R., and Haid, J. 2011c. A side channel attack countermeasure using system-on-chip power profile scrambling. In Proceedings of the 17th International IEEE Online Testing Symposium (IOLTS’11). IEEE, 222--227. Google Scholar
Digital Library
- Leveugle, R. 2002. Fault injection in vhdl descriptions and emulation. In Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems. IEEE, 414--419. Google Scholar
Digital Library
- Leveugle, R. 2007. Early analysis of fault-based attack effects in secure circuits. IEEE Trans. Comput. 56, 10, 1431--1434. Google Scholar
Digital Library
- Leveugle, R. and Hadjiat, K. 2003. Multi-level fault injections in vhdl descriptions: Alternative approaches and experiments. J. Electron. Test. 19, 5, 559--575. Google Scholar
Digital Library
- Li, H., Markettos, A., and Moore, S. 2005. Security evaluation against electromagnetic analysis at design time. In Proceedings of the 10th International High-Level Design Validation and Test Workshop. 211--218. Google Scholar
Digital Library
- Lopez-Ongil, C., Garcia-Valderas, M., Portela-Garcia, M., and Entrena, L. 2007. Autonomous fault emulation: A new fpga-based acceleration system for hardness evaluation. IEEE Trans. Nucl. Sci. 54, 1, 252.Google Scholar
Cross Ref
- Mangard, S., Oswald, E., and Popp, T. 2007. Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer. Google Scholar
Digital Library
- OpenCores. 2011. Aes_crypto_core. http://opencores.net/project,aes_crypto_core.Google Scholar
- Pohl, C., Paiz, C., and Porrmann, M. 2009. vMAGIC: Automatic code generation for vhdl. J. Reconfig. Comput. 2009.Google Scholar
- Ravi, S., Raghunathan, A., Kocher, P., and Hattangady, S. 2004. Security in embedded systems: Design challenges. ACM Trans. Embed. Comput. Syst. 3, 3, 461--491. Google Scholar
Digital Library
- Regazzoni, F., Badel, S., Eisenbarth, T., Grossschaedl, J., Poschmann, A., Toprak, Z., Macchetti, M., Pozzi, L., Paar, C., Leblebici, Y., and Ienne, P. 2007. A Simulation-based methodology for evaluating the dpa-resistance of cryptographic functional units with application to cmos and mcml technologies. In Proceedings of the International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (SAMOS’07). 209--214.Google Scholar
- Regazzoni, F., Cevrero, A., Standaert, F.-X., Badel, S., Kluter, T., Brisk, P., Leblebici, Y., and Ienne, P. 2009. A design flow and evaluation framework for dpa-resistant instruction set extensions. In Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES’09). Springer, 205--219. Google Scholar
Digital Library
- Roche, T., Lomné, V., and Khalfallah, K. 2011. Combined fault and side-channel attack on protected implementations of aes. Smart Card Res. Adv. Appl., 65--83. Google Scholar
Digital Library
- Rothbart, K., Neffe, U., Steger, C., Weiss, R., Rieger, E., and Muehlberger, A. 2004. High level fault injection for attack simulation in smart cards. In Proceedings of the 13th Asian Test Symposium. Google Scholar
Digital Library
- Schaumont, P. and Tiri, K. 2007. Masking and dual-rail logic don’t add up. In Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES’07). 95--106. Google Scholar
Digital Library
- Schmidt, J., Hutter, M., and Plos, T. 2009. Optical fault attacks on AES: A threat in violet. In Proceedings of the IEEE Workshop on Fault Diagnosis and Tolerance in Cryptography. IEEE, 13--22. Google Scholar
Digital Library
- Segall, Z., Vrsalovic, D., Siewiorek, D., Yaskin, D., Kownacki, J., Barton, J., Dancey, R., Robinson, A., and Lin, T. 2002. Fiat-fault injection based automated testing environment. In Proceedings of the 18th International Symposium on Fault-Tolerant Computing (FTCS’02) Digest of Papers. IEEE, 102--107.Google Scholar
- Shumov, D. and Montgomery, P. L. 2010. Side channel leakage profiling in software. In Proceedings of the International Workshop on Constructive Side-Channel Analysis ans Secure Design (COSADE’10).Google Scholar
- Takahashi, J., Fukunaga, T., and Yamakoshi, K. 2007. DFA mechanism on the aes key schedule. In Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’07). 62--74. Google Scholar
Digital Library
- Thuillet, C., Andouard, P., and Ly, O. 2009. A smart card power analysis simulator. In Proceedings of the International Conference on Computational Science and Engineering (CSE’09). 847--852. Google Scholar
Digital Library
- Tsai, T., Hsueh, M., Zhao, H., Kalbarczyk, Z., and Iyer, R. 2002. Stress-Based and path-based fault injection. IEEE Trans. Comput. 48, 11, 1183--1201. Google Scholar
Digital Library
- Valderas, M., Garcia, M., Cardenal, R., Ongil, L., and Entrena, L. 2007. Advanced simulation and emulation techniques for fault injection. In Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE’07). IEEE, 3339--3344.Google Scholar
- Zheng, H., Fan, L., and Yue, S. 2008. FITVS: A fpga-based emulation tool for high-efficiency hardness evaluation. In Proceedings of the International Symposium on Parallel and Distributed Processing with Applications (ISPA’08). IEEE, 525--531. Google Scholar
Digital Library
Index Terms
POWER-MODES: POWer-EmulatoR- and MOdel-Based DEpendability and Security Evaluations
Recommendations
Enhancing Fault Emulation of Transient Faults by Separating Combinational and Sequential Fault Propagation
GLSVLSI '16: Proceedings of the 26th edition on Great Lakes Symposium on VLSIWe present a fault emulation environment capable of injecting single and multiple transient faults in sequential as well as combinational logic. It is used to perform fault injection campaigns during design verification of security circuits such as ...
Case study on multiple fault dependability and security evaluations
The increasing level of integration and decreasing size of circuit elements leads to higher probabilities of operational faults. More vulnerable electronic devices are also more prone to external influence from energizing radiation. Additionally, the ...
Hardware-Accelerated Workload Characterization for Power Modeling and Fault Injection
ATS '12: Proceedings of the 2012 IEEE 21st Asian Test SymposiumDuring recent years the increasing introduction of system functionality into integrated devices resulted into several new problems for chip designers. First, high system-on-chip complexity combined with increased clock frequencies leads to power budget ...






Comments