Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電信工程學研究所
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/94207
Title: 以選擇性故障檢測增強密碼程式安全性
Enhancing the Security of Cryptographic Programs with Selective Fault Detection
Authors: 陳俊宇
Chun-Yu Chen
Advisor: 黃俊郎
Jiun-Lang Huang
Keyword: 硬體安全,故障注入攻擊,防禦措施,冗餘,軟體故障檢測,編譯器,
Hardware Security,Fault Injection Attack,Countermeasures,Redundancy,Software Fault Detection,Compiler,
Publication Year : 2024
Degree: 碩士
Abstract: 故障注入攻擊對嵌入式系統中密碼程式的安全性構成了重大威脅。現有研究提出了基於時間冗餘的保護措施,然而,此方法帶來了顯著的程式大小與執行速度上的開銷。本論文提出了一種新穎的方法,通過選擇性故障檢測機制來增強密碼程式的安全性,並且利用編譯器技術自動應用保護措施。
我們提出的方法包括「複製並比較」(Duplication With Comparison, DWC)機制,該機制透過複製關鍵指令並比較其結果來檢測並應對單一指令跳過故障。DWC機制在檢測到故障後執行使用者定義的對應措施,以防止進一步的故障注入攻擊。此外,我們提出了基於敏感度的選擇性保護方案,識別並保護與核心敏感變數相關的脆弱指令。這種方法在保持高度安全性的同時,大幅減少了開銷。
實驗結果表明,我們所提出的方法能夠精準地保護易受故障注入攻擊的指令,與現有保護措施相比,減少了程式大小和執行速度開銷,並且適用於AES和CRYSTALS-Kyber等密碼演算法程式,證明了此法是輕量且通用的密碼程式保護措施。
Fault Injection Attacks (FIAs) pose a significant threat to the security of cryptographic programs in embedded systems. Existing work has proposed time redundancy-based countermeasures, which introduce significant code size and performance overhead. This research introduces a novel approach to enhancing the security of cryptographic programs through selective fault detection mechanisms, utilizing compiler techniques to automatically apply protection measure.
Our proposed method includes the Duplication With Comparison (DWC) mechanism, designed specifically to detect and respond to single instruction skip faults by duplicating critical instructions and comparing their outcomes. Upon detecting a fault, the DWC mechanism executes user-defined response actions to prevent further fault injection attacks. Additionally, we introduce a Sensitivity-based selective protection scheme, which identifies and protects the most vulnerable instructions related to the Core Sensitive Variable. This approach minimizes performance overhead while maintaining robust security across different cryptographic algorithms, including AES and CRYSTALS-Kyber.
Experimental results demonstrate that the proposed method effectively protects critical instructions and reduces code size and performance overhead compared to existing countermeasures. This thesis highlights the potential of the proposed method to provide lightweight, generalizable protection for a wide range of cryptographic programs.
URI: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/94207
DOI: 10.6342/NTU202403485
Fulltext Rights: 同意授權(全球公開)
metadata.dc.date.embargo-lift: 2029-08-05
Appears in Collections:電信工程學研究所

Files in This Item:
File SizeFormat 
ntu-112-2.pdf
  Until 2029-08-05
1.77 MBAdobe PDF
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved