Paper 2020/1228
Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices
Colin O'Flynn
Abstract
Body Biasing Injection (BBI) uses a voltage applied with a physical probe onto the backside of the integrated circuit die. Compared to other techniques such as electromagnetic fault injection (EMFI) or Laser Fault Injection (LFI), this technique appears less popular in academic literature based on published results. It is hypothesized being due to (1) moderate cost of equipment, and (2) effort required in device preperation. This work demonstrates that BBI (and indeed many other backside attacks) can be trivially performed on Wafer-Level Chip-Scale Packaging (WLCSP), which inherently expose the die backside. A low-cost ($15) design for the BBI tool is introduced, and validated with faults introduced on a STM32F415OG against code flow, RSA, and some initial results on various hardware block attacks are discussed.
Note: Typo fixes from initial
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. Major revision. Smart Card Research and Advanced Application Conference (CARDIS) 2020
- Keywords
- Fault InjectionGlitch AttacksBody Biasing Injection
- Contact author(s)
- colin @ oflynn com
- History
- 2020-10-09: revised
- 2020-10-06: received
- See all versions
- Short URL
- https://ia.cr/2020/1228
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/1228, author = {Colin O'Flynn}, title = {Low-Cost Body Biasing Injection ({BBI}) Attacks on {WLCSP} Devices}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/1228}, year = {2020}, url = {https://eprint.iacr.org/2020/1228} }