Paper 2020/1115

SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets

Karim M. Abdellatif and Olivier Hériveaux

Abstract

Electromagnetic Fault Injection (EMFI) is considered as an effective fault injection technique for the purpose of conducting physical attacks against integrated circuits. It enables an adversary to inject errors on a circuit to gain knowledge of sensitive information or to bypass security features. The aim of this paper is to highlight the design and validation of SiliconToaster, which is a cheap and programmable platform for EM pulse injection. It has been designed using low-cost and accessible components that can be easily found. In addition, it can inject faults with a programmable voltage up to 1.2kV without the need to an external power supply as it is powered by the USB. The second part of the paper invests the SiliconToaster in order to bypass the firmware security protections of an IoT chip. Two security configurations were bypassed sequentially in a non-invasive way (without chip decapsulation).

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. FDTC2020
Keywords
Electromagnetic fault injectionlow-cost toolsfirmware protection
Contact author(s)
karim abdellatif @ ledger fr
History
2020-09-21: received
Short URL
https://ia.cr/2020/1115
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1115,
      author = {Karim M.  Abdellatif and Olivier Hériveaux},
      title = {{SiliconToaster}: A Cheap and Programmable {EM} Injector for Extracting Secrets},
      howpublished = {Cryptology {ePrint} Archive, Paper 2020/1115},
      year = {2020},
      url = {https://eprint.iacr.org/2020/1115}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.