Fuzzy-glitch: A practical ring oscillator based clock glitch attack

Johannes Obermaier, Robert Specht, Georg Sigl

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Clock glitches are useful in hardware security applications, where systems are tested for vulnerabilities emerging from fault attacks. Usually a precisely timed and controlled glitch signal is employed. However, this requires complex generators and deep knowledge about the system under attack. Therefore we present a novel approach on clock glitch fault attacks that replaces the single precise glitch by a fuzzy glitch signal. We propose a compact FPGA design for fuzzy clock glitch generation, that is based on mixing two adjustable ring oscillators of different frequencies. The combination of these oscillators creates a glitch containing random and high frequency signal components. We show on the basis of a practical implementation on a Spartan-3E, that the proposed method is able to generate the desired fuzzy clock glitch. We verified experimentally, that the fuzzy clock glitch succeeds in error injection on an STM32F030, an ARM CORTEX-M0 based microcontroller. Our results demonstrate that the fuzzy glitch is an adequate solution for fault injection.

Original languageEnglish
Title of host publication22nd 2017 International Conference on Applied Electronics, AE 2017
EditorsJiri Pinker
PublisherIEEE Computer Society
ISBN (Electronic)9788026106418
DOIs
StatePublished - 28 Sep 2017
Event22nd International Conference on Applied Electronics, AE 2017 - Pilsen, Czech Republic
Duration: 5 Sep 20176 Sep 2017

Publication series

NameInternational Conference on Applied Electronics
ISSN (Print)1803-7232

Conference

Conference22nd International Conference on Applied Electronics, AE 2017
Country/TerritoryCzech Republic
CityPilsen
Period5/09/176/09/17

Fingerprint

Dive into the research topics of 'Fuzzy-glitch: A practical ring oscillator based clock glitch attack'. Together they form a unique fingerprint.

Cite this