论文标题
评估低成本热激光刺激数据提取和关键读数
Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout
论文作者
论文摘要
使用热激光刺激(TLS)的近期攻击表明,可以从最新的现场可编程门阵列(FPGA)上从电池支持的内存中提取加密密钥。但是,通常用于这些攻击的专业故障分析显微镜以50万至100万美元的价格使用。在这项工作中,我们评估了使用合适的放大器和光源改装的便宜商业激光断层注射站的使用,以实现TLS。我们证明,TLS攻击是可能的,硬件成本约为100K美元。这构成将攻击者要求的资源减少至少五个。我们展示了两次实际攻击:从低功率微控制器的SRAM内存中提取数据,并从20 nm技术FPGA设备中提取了解密密钥。然后,与常规故障分析设备方法相比,讨论了我们低成本方法的优势和劣势。通常,这项工作表明,TLS背面攻击的成本比以前预期的要低得多。
Recent attacks using thermal laser stimulation (TLS) have shown that it is possible to extract cryptographic keys from the battery-backed memory on state-of-the-art field-programmable gate arrays (FPGAs). However, the professional failure analysis microscopes usually employed for these attacks cost in the order of 500k to 1M dollars. In this work, we evaluate the use of a cheaper commercial laser fault injection station retrofitted with a suitable amplifier and light source to enable TLS. We demonstrate that TLS attacks are possible at a hardware cost of around 100k dollars. This constitutes a reduction of the resources required by the attacker by a factor of at least five. We showcase two actual attacks: data extraction from the SRAM memory of a low-power microcontroller and decryption key extraction from a 20-nm technology FPGA device. The strengths and weaknesses of our low-cost approach are then discussed in comparison with the conventional failure analysis equipment approach. In general, this work demonstrates that TLS backside attacks are available at a much lower cost than previously expected.