Skip to content
/ VerFI Public

Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)

License

Notifications You must be signed in to change notification settings

emsec/VerFI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 

Repository files navigation

VerFI ver 2 Beta

This repository contains the source code for the program written for the project "Cryptographic Fault Diagnosis using VerFI"

The first version of the program is published here: https://github.com/vmarribas/VerMFi

This repository is the second version of the program which supports not all features but has a higher performance. The program is written in Ruhr University Bochum, Embedded Security (Germany)

You find two folders in the repository:

  • "VerFI_for_attack": it can be used to emulate fault-injection attacks. It generates input/outputs for which the injected fault was "detected"/"ineffective"/"non-detected". The generated result can be used to mount an attack like DFA/SIFA.

  • "VerFI_for_diagnosis": it can be used to examine a design in detection/correction of the faults. The tool provides a summary of the diagnosis and can generate detailed list of the diagnosis, e.g., for which kind of fault, in which clock cycle, and which cells the result is "faulty"/"fault is detected"/"fault is ineffective".

Note that the tool thinks that an injected fault is detected if the output is fully zero.

The paper is published by IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020. Please use the following citation, if you use our implementations in your research:

Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova: Cryptographic Fault Diagnosis using VerFI. HOST 2020.

The pre-print version of the paper is available here: https://eprint.iacr.org/2019/1312