Abstract
Devices aimed for the Internet of Things (loT) market are required to be both low cost and highly secured, as they are expected to be integrated in ordinary 'things' while storing and processing sensitive information. In this paper we examine the vulnerabilities of a commercial secured IoT memory chip to precise and localized back-side laser fault injection. We explain the different steps needed in order to prepare the sample, and describe the laser fault injection setup. From the experiments we conclude that the chip relies mostly on physical countermeasures which renders obsolete in this kind of attack. Further more, the experiments stress the necessity for sophisticated Error Detecting Codes in order to efficiently protect the integrity of the sensitive information stored and processed in the chip.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - 2017 7th International Conference on Emerging Security Technologies, EST 2017 |
| Publisher | Institute of Electrical and Electronics Engineers Inc. |
| Pages | 7-11 |
| Number of pages | 5 |
| ISBN (Electronic) | 9781538640173 |
| DOIs | |
| State | Published - 30 Oct 2017 |
| Event | 7th International Conference on Emerging Security Technologies, EST 2017 - Canterbury, United Kingdom Duration: 6 Sep 2017 → 8 Sep 2017 |
Publication series
| Name | Proceedings - 2017 7th International Conference on Emerging Security Technologies, EST 2017 |
|---|
Conference
| Conference | 7th International Conference on Emerging Security Technologies, EST 2017 |
|---|---|
| Country/Territory | United Kingdom |
| City | Canterbury |
| Period | 6/09/17 → 8/09/17 |
Bibliographical note
Publisher Copyright:© 2017 IEEE.