Phoenix CMS Accéder au BO

INFORMATIQUE, TÉLÉCOM - SCIENCES, TECHNOLOGIES - AGROALIMENTAIRE - BASES DE DONNÉES - BÂTIMENT, TRAVAUX...

Fault attack analysis and countermeasure design for RISC-V core on FPGA


Grenoble INP
Valence

Réf. 995876 - publié le 15 octobre 2024


M'alerter sur les offres

Informations générales

DOMAINE DE FORMATION

Informatique, télécom - Sciences, technologies - Agroalimentaire - Bases de données - Bâtiment, travaux publics, génie civil - Design industriel - Développement, Génie logiciel - Electronique, électrotechnique - Energétique, thermique, hydraulique - Génie biologique et médical - Géologie, cosmologie, biologie - Hygiène et sécurité - Industries chimiques et pharmaceutiques - Informatique de gestion - Ingénieur généraliste - Intelligence artificielle - Maintenance informatique - Matériaux - Mathématiques, statistiques - Mécanique, génie mécanique - Métrologie, contrôle, instrumentation - Organisation et gestion de production - Physique, chimie - Procédés industriels - Sciences et technologies - Télécoms, Web, Réseaux,

NIVEAU D'ÉTUDES

Bac +5

GRATIFICATION

657

PÉRIODE

Internship duration: 5 to 6 months



Missions

Grenoble INP vous propose une offre de stage dans les domaines Informatique, télécom, Sciences, technologies, Agroalimentaire, Bases de données, Bâtiment, travaux... à Valence.

In the context of hardware security, fault injection can be defined as a powerful physical attack,
possibly non-invasive, where the attacker has physical access to the device or its surrounding
environment. The attacker will try to change the normal behavior of the device during program
execution by injecting one or more faults, then observing the erroneous behavior. This behavior can
be further exploited as a vulnerability [1]. The injection process can be done in different ways:
exposing the device to radiations, laser beams, intense light, or an electromagnetic (EM) pulse,
inducing variations in the power supply or in the clock signal, changing the environmental
conditions such as the temperature, etc. [2].
To secure microprocessors and microcontrollers against such attacks, we developed a
comprehensive model of faults and fault effects. This includes characterization and analysis of
faults that could lead to exploitable code vulnerabilities [3].
In the ARSENE project [4], we aim at designing secure microprocessor for IoT nodes using 32
bits RISC-V core. Based on already developed cores from the OpenHW Group, such as the
CV32E40P core, we want to propose new efficient and fair cost countermeasures against such
physical attacks. Several attack campaigns have been already carried out on a RISC-V ASIC
(SiFive FE310-G002), and we understand most of the faults which explain faulty behaviors both at
the RTL or ISA levels. Using this knowledge, we want to design and assess new low cost
countermeasures against clock, voltage or EM glitch fault injection.
The intern will implement a RISC-V CV32E40P microarchitecture on FPGA ChipWhisperer board
(CW305), test it and perform fault injection campaigns (clock or voltage glitches or EM pulse)
using ChipWhisperer capabilities. Faulty behavior will be compared with previous observed faulty
behaviors on RISC-V ASIC. Then, the intern will propose and design countermeasures suited to the
determined fault model and assess their effectiveness using the FPGA ChipWhisperer board.
In this internship, the main tasks will be:
• Prototyping RISC-V core (CV32E40P) in FPGA
• Conducting fault injection campaigns using ChipWhisperer environment
• Analyzing and determining fault effect and compare with existing fault models
• Design and implementation of countermeasures
• Performing fault injection attacks to rate effectiveness of the countermeasures


Profil

Who can apply: Applicants must be enrolled in a Master’s degree or engineering school in cyber
security, computer engineering or embedded systems and have interests in hardware security.
Required skills:
• Microprocessor architectures
• Hardware design language (SystemVerilog, Verilog or VHDL)
• Hardware design and simulation tools (Vivado, Modelsim)
• C and assembly
• Knowledge of hardware attacks or RISC-V ISA is a plus


Postuler

Nom du recruteur : Vincent Beroulle


Offres similaires

Nos sélections d'offres de stages

Les articles en lien

Partagez sur les réseaux sociaux !