Skip to Main Content
Frequently Asked Questions
Submit an ETD
Global Search Box
Need Help?
Keyword Search
Participating Institutions
Advanced Search
School Logo
Files
File List
Thesis-Classic-2014.pdf (2.61 MB)
ETD Abstract Container
Abstract Header
High Speed Clock Glitching
Author Info
Desiraju, Santosh
Permalink:
http://rave.ohiolink.edu/etdc/view?acc_num=csu1424139368
Abstract Details
Year and Degree
2015, Master of Science in Electrical Engineering, Cleveland State University, Washkewicz College of Engineering.
Abstract
In recent times, hardware security has drawn lot of interest in the research community. With physical proximity to the target devices, various fault injection hardware attack methods have been proposed and tested to alter their functionality and trigger behavior not intended by the design. There are various types of faults that can be injected depending on the parameters being used and the level at which the device is tampered with. The literature describes various fault models to inject faults in clock of the target but there are no publications on overclocking circuits for fault injection. The proposed method bridges this gap by conducting high-speed clock fault injection on latest high-speed micro-controller units where the target device is overclocked for a short duration in the range of 4-1000 ns. This thesis proposes a method of generating a high-speed clock and driving the target device using the same clock. The properties of the target devices for performing experiments in this research are: Externally accessible clock input line and GPIO line. The proposed method is to develop a high-speed clock using custom bit-stream sent to FPGA and subsequently using external analog circuitry to generate a clock-glitch which can inject fault on the target micro-controller. Communication coupled with glitching allows us to check the target’s response, which can result in information disclosure. This is a form of non-invasive and effective hardware attack. The required background, methodology and experimental setup required to implement high-speed clock glitching has been discussed in this thesis. The impact of different overclock frequencies used in clock fault injection is explored. The preliminary results have been discussed and we show that even high-speed micro-controller units should consider countermeasures against clock fault injection. Influencing the execution of Tiva C Launchpad and STM32F4 micro-controller units has been shown in this thesis. The thesis details the method used for the testing and the parameters used in the process are included. The implementation and design of the clock-glitch prototype system on the FPGA-clock jitter cleaner platform is discussed in this research. Glitching the execution of high-frequency targets is the goal of this project.
Committee
Chansu Yu, PhD. (Committee Chair)
Pong Chu, PhD. (Committee Member)
Sanchita Mal-Sarkar, PhD. (Committee Member)
Swarup Bhunia, PhD. (Committee Member)
Subject Headings
Electrical Engineering
;
Engineering
Keywords
Fault Injection
;
Clock glitching
;
Hardware attacks
;
RSA
;
High-speed clock
;
ARM Cortex-M4
Recommended Citations
Refworks
EndNote
RIS
Mendeley
Citations
Desiraju, S. (2015).
High Speed Clock Glitching
[Master's thesis, Cleveland State University]. OhioLINK Electronic Theses and Dissertations Center. http://rave.ohiolink.edu/etdc/view?acc_num=csu1424139368
APA Style (7th edition)
Desiraju, Santosh.
High Speed Clock Glitching.
2015. Cleveland State University, Master's thesis.
OhioLINK Electronic Theses and Dissertations Center
, http://rave.ohiolink.edu/etdc/view?acc_num=csu1424139368.
MLA Style (8th edition)
Desiraju, Santosh. "High Speed Clock Glitching." Master's thesis, Cleveland State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=csu1424139368
Chicago Manual of Style (17th edition)
Abstract Footer
Document number:
csu1424139368
Download Count:
1,687
Copyright Info
© 2015, all rights reserved.
This open access ETD is published by Cleveland State University and OhioLINK.