2019 Design, Automation & Test in Europe Conference & Exhibition (DATE) | 2019

Fault Injection on Hidden Registers in a RISC-V Rocket Processor and Software Countermeasures

 
 
 
 

Abstract


To protect against hardware fault attacks, developers can use software countermeasures. They are generally designed to thwart software fault models such as instruction skip or memory corruption. However, these typical models do not take into account the actual implementation of a processor. By analyzing the processor microarchitecture, it is possible to bypass typical software countermeasures. In this paper, we analyze the vulnerability of a secure code from FISSC (Fault Injection and Simulation Secure Collection), by simulating fault injections in a RISC-V Rocket processor RTL description. We highlight the importance of hidden registers in the processor pipeline, which temporarily hold data during code execution. Secret data can be leaked by attacking these hidden registers. Software countermeasures against such attacks are also proposed.

Volume None
Pages 252-255
DOI 10.23919/DATE.2019.8715158
Language English
Journal 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)

Full Text