Redirecting to original paper in 30 seconds...
Click below to go immediately or wait for automatic redirect
📄 Abstract
Abstract: Static side-channel analysis attacks, which rely on a stopped clock to
extract sensitive information, pose a growing threat to embedded systems'
security. To protect against such attacks, several proposed defenses aim to
detect unexpected variations in the clock signal and clear sensitive states. In
this work, we present \emph{Chypnosis}, an undervolting attack technique that
indirectly stops the target circuit clock, while retaining stored data.
Crucially, Chypnosis also blocks the state clearing stage of prior defenses,
allowing recovery of secret information even in their presence. However, basic
undervolting is not sufficient in the presence of voltage sensors designed to
handle fault injection via voltage tampering. To overcome such defenses, we
observe that rapidly dropping the supply voltage can disable the response
mechanism of voltage sensor systems. We implement Chypnosis on various FPGAs,
demonstrating the successful bypass of their sensors, both in the form of soft
and hard IPs. To highlight the real-world applicability of Chypnosis, we show
that the alert handler of the OpenTitan root-of-trust, responsible for
providing hardware responses to threats, can be bypassed. Furthermore, we
demonstrate that by combining Chypnosis with static side-channel analysis
techniques, namely laser logic state imaging (LLSI) and impedance analysis
(IA), we can extract sensitive information from a side-channel protected
cryptographic module used in OpenTitan, even in the presence of established
clock and voltage sensors. Finally, we propose and implement an improvement to
an established FPGA-compatible clock detection countermeasure, and we validate
its resilience against Chypnosis.
Key Contributions
Introduces Chypnosis, an undervolting-based attack technique that indirectly stops the target circuit clock while preserving stored data, effectively bypassing state-clearing defenses. It further overcomes voltage sensors by rapidly dropping the supply voltage, enabling secret information recovery even in the presence of prior countermeasures.
Business Value
Highlights critical vulnerabilities in embedded systems, driving the need for more robust security designs and advanced testing methodologies to protect sensitive data.