Cryptology ePrint Archive: Report 2016/810

Fault Injection using Crowbars on Embedded Systems

Colin O'Flynn

Abstract: Causing a device to incorrectly execute an instruction or store faulty data is well-known strategy for attacking cryptographic implementations on embedded systems. One technique to generate such faults is to manipulate the supply voltage of the device. This paper introduces a novel technique to introduce those supply voltage manipulations onto existing digital systems, requiring minimal modifications to the device being attacked. This uses a crowbar to short the power supply for controlled periods of time. High-accuracy faults are demonstrated on the 8-bit AVR microcontroller, which can generate both single and multi-bit faults with high repeatability. Additionally this technique is demonstrated on a FPGA where it is capable of generating faults in both internal registers and the configuration fabric.

Category / Keywords: implementation / fault injection, voltage faulting

Date: received 23 Aug 2016

Contact author: coflynn at newae com

Available format(s): PDF | BibTeX Citation

Version: 20160825:050844 (All versions of this report)

Short URL: ia.cr/2016/810

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]