Cryptology ePrint Archive: Report 2020/937

BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks

Colin O'Flynn

Abstract: Electromagnetic Fault Injection (EMFI) is a well-known technique for performing fault injection attacks. While such attacks may be easy demonstrated in a laboratory condition, information about the applicability of them to real-life environments is critical for designer of ECUs to understand the effort that should be spent on protecting against them. This work targets a recent (2019) automotive ECU, and analyzes the target microcontroller used in laboratory conditions, and then transitions the attack to a real-world “in-situ” attack similar to a garage bench.

The specific work appears relevant to several devices in the MPC55xx and MPC56xx series, which are automotive-focused PowerPC devices.

Category / Keywords: applications / fault injection, EMFI, secure boot, physical security

Original Publication (with minor differences): ESCAR Europe 2020

Date: received 29 Jul 2020, last revised 5 Sep 2020

Contact author: colin at oflynn com

Available format(s): PDF | BibTeX Citation

Version: 20200906:010555 (All versions of this report)

Short URL: ia.cr/2020/937


[ Cryptology ePrint archive ]