白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Devices and methods for the detection and localization of fault injection attacks

專(zhuān)利號(hào)
US11930098B2
公開(kāi)日期
2024-03-12
申請(qǐng)人
SECURE-IC SAS(FR Cesson-Sevigne)
發(fā)明人
Rachid Dafali
IPC分類(lèi)
H04L9/40; G06F7/58; H04L9/00
技術(shù)領(lǐng)域
signal,attacks,clock,random,digital,manager,circuit,values,or,receiver
地域: Cesson-Sevigne

摘要

A device for detecting perturbation attacks performed on a digital circuit is provided. The device comprises: a first metallic layer and a second metallic layer arranged on the digital circuit, the first metal layer comprising a plurality of signal transmission lines routed horizontally, the second metal layer comprising a plurality of signal transmission lines routed vertically, the device comprising one or more transmitter buffers and one or more receiver buffers, a transmitter buffer and a receiver buffer being connected by each signal transmission line; a random number generator configured to generate random signal values; the device further comprising a transmitter manager connected to one or more transmitter buffers and a receiver manager connected to one or more receiver buffers, wherein: the transmitter manager is configured to transmit random signal values generated by the random number generator over the signal transmission lines of the first metallic layer and the second metallic layer, the receiver manager is configured to receive random signal values from the transmitter manager through the one or more receiver buffers connected to the receiver manager, measure a transmission time corresponding to a time of transmission of the received random signal values, and compare the transmission time to a predefined timing interval to detect perturbation attacks.

說(shuō)明書(shū)

  • if it is determined in step 37 that the random signal values transmitted through the signal transmission lines change more than two times during one system clock cycle, this means that the values of the transmitted signals changed many times during the transmission and that the digital circuit 1 is under an external manipulation.
  • Step 39 may further comprise raising a security alarm when one or more perturbation attacks are detected. A security alarm may be raised in order to execute one or more security actions that enable the protection of the digital circuit against the detected perturbation attack(s). For example, a security action may consist of a passive action (such as doing nothing) or an active action (corrective action) such as stopping (permanently or temporarily) the running of the digital circuit 1, rebooting or restarting one or more parts of the integrated circuit device to which belongs the digital circuit 1, deleting or regenerating secret values (e.g. cryptographic keys). The security action may depend on the localization of the detected perturbation attack and/or on the security strategy/policy adopted for specific parts/localizations of the digital circuit 1.

    Further, the localization of the detected one or more perturbation attacks may be performed in step 39 using at least one signal transmission line that is routed horizontally within the first metallic layer and at least one signal transmission lines that is routed vertically within the second metallic layer.

    The method for the detection and localization of perturbation attacks enables advantageously a real-time detection and a precise localization of fault injection attacks such as power glitch, system clock tampering attacks, laser/light injection attacks, and EM injection attacks.

    權(quán)利要求

    1
    微信群二維碼
    意見(jiàn)反饋