Publication type: Conference paper
Type of review: Peer review (publication)
Title: Attacking secure-element-hardened MCUboot using a low-cost fault injection toolkit
Authors: Noseda, Mario
Künzli, Simon
et. al: No
DOI: 10.1007/978-3-031-52947-4_10
Proceedings: Innovative Security Solutions for Information Technology and Communications
Editors of the parent work: Manulis, Mark
Maimuţ, Diana
Teşeleanu, George
Page(s): 126
Pages to: 143
Conference details: 16th International Conference on Security for Information Technology and Communications (SecITC), Bukarest, Romania, 23-24 November 2023
Issue Date: 21-Jan-2024
Series: Lecture Notes in Computer Science
Series volume: 14534
Publisher / Ed. Institution: Springer
Publisher / Ed. Institution: Cham
ISBN: 978-3-031-52946-7
978-3-031-52947-4
Language: English
Subjects: Fault injection; Voltage glitching; MCUboot; Secure element; Ethical hacking; Hardware implant; Embedded system
Subject (DDC): 006: Special computer methods
Abstract: The bootloader is a critical part of a device's secure startup, and its interactions with firmware images require cryptographic operations. Instead of storing keys for authentication and encryption in the bootloader, one can harden the system by offloading the key storage and all cryptographic operations to a secure element. This paper analyzes the susceptibility of MCUboot used in conjunction with a secure element to voltage fault injection during firmware image verification. We designed and built a low-cost voltage fault injection tool using a Cortex-M7 MCU and an analog switch, which can achieve a timing resolution of 6.67 ns. We found vulnerable instructions in the glue code between the bootloader and the secure element library. By targeting these vulnerable instructions, we showed how an attacker could bypass a signature verification performed by a secure element by faulting a Nordic nRF52840 host MCU. While secure elements are still suited for securely storing keys and other sensitive data, a holistic approach is required to secure a device against fault injection. Otherwise, the threat of fault injection could diminish the benefits of secure bootloaders and secure elements.
URI: https://digitalcollection.zhaw.ch/handle/11475/29794
Fulltext version: Published version
License (according to publishing contract): Licence according to publishing contract
Departement: School of Engineering
Organisational Unit: Institute of Embedded Systems (InES)
Appears in collections:Publikationen School of Engineering

Files in This Item:
There are no files associated with this item.
Show full item record
Noseda, M., & Künzli, S. (2024). Attacking secure-element-hardened MCUboot using a low-cost fault injection toolkit [Conference paper]. In M. Manulis, D. Maimuţ, & G. Teşeleanu (Eds.), Innovative Security Solutions for Information Technology and Communications (pp. 126–143). Springer. https://doi.org/10.1007/978-3-031-52947-4_10
Noseda, M. and Künzli, S. (2024) ‘Attacking secure-element-hardened MCUboot using a low-cost fault injection toolkit’, in M. Manulis, D. Maimuţ, and G. Teşeleanu (eds) Innovative Security Solutions for Information Technology and Communications. Cham: Springer, pp. 126–143. Available at: https://doi.org/10.1007/978-3-031-52947-4_10.
M. Noseda and S. Künzli, “Attacking secure-element-hardened MCUboot using a low-cost fault injection toolkit,” in Innovative Security Solutions for Information Technology and Communications, Jan. 2024, pp. 126–143. doi: 10.1007/978-3-031-52947-4_10.
NOSEDA, Mario und Simon KÜNZLI, 2024. Attacking secure-element-hardened MCUboot using a low-cost fault injection toolkit. In: Mark MANULIS, Diana MAIMUŢ und George TEŞELEANU (Hrsg.), Innovative Security Solutions for Information Technology and Communications. Conference paper. Cham: Springer. 21 Januar 2024. S. 126–143. ISBN 978-3-031-52946-7
Noseda, Mario, and Simon Künzli. 2024. “Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault Injection Toolkit.” Conference paper. In Innovative Security Solutions for Information Technology and Communications, edited by Mark Manulis, Diana Maimuţ, and George Teşeleanu, 126–43. Cham: Springer. https://doi.org/10.1007/978-3-031-52947-4_10.
Noseda, Mario, and Simon Künzli. “Attacking Secure-Element-Hardened MCUboot Using a Low-Cost Fault Injection Toolkit.” Innovative Security Solutions for Information Technology and Communications, edited by Mark Manulis et al., Springer, 2024, pp. 126–43, https://doi.org/10.1007/978-3-031-52947-4_10.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.