Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective

  • David P. Maher
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1318)


We put many of the new fault induction and reverse engineering attacks on secure systems into the context of real device implementations and actual systems. We describe countermeasures that diminish the overall practical significance of these new results when considered in the context of a rational design process and an overall systems security strategy.


Smart Card Reverse Engineering Successful Attack Threat Model Fault Induction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [AK96a]
    RJ Anderson and M Kuhn, “Tamper Resistance — a Cautionary Note.” Proceedings of the 2 nd Workshop on Electronic Commerce, Oakland, CA, November 18–20, 1996.Google Scholar
  2. [AK96b]
    RJ Anderson and M Kuhn, “Warning to the Crypto and Banking Committee — A serious weakness of DES”, Draft — November 2, 1996. Ftp:// Scholar
  3. [AK96c]
    RJ Anderson and M Kuhn, “Improved Differential Fault Analysis”, Draft, November 1996 from Ftp:// Scholar
  4. [BDL96]
    D Boneh, RA DeMillo, RJ Lipton “Cryptanalysis in the presence of Hardware Faults” Preprint — Sept, 1996. Re-issued as “On the importance of Checking Computations”, preprint-1996, to appear at Eurocrypt '97.Google Scholar
  5. [Bel96a]
    Bellcore Security Alert, “Now Smart Cards can leak Secrets — A new breed of Crypto Attack on ‘Tamperproof Tokens Cracks Even the Strongest RSA Code”, September 1995.Google Scholar
  6. [Bel96b]
    Bellcore Press Release,, Sept. 1996Google Scholar
  7. [BS96a]
    E Biham, A Shamir, “A new cryptanalytic attack on DES”, preprint Oct. 18, 1996Google Scholar
  8. [BS96b]
    E Biham, A Shamir, “Differential Fault Analysis: Identifying the Structure of Unknown Ciphers Sealed in Tamper-Proof Devices”, Preprint November 11, 1996.Google Scholar
  9. [CFPR96]
    D Coppersmith, M Franklin, J Patarin, M Reiter, “Low Exponent RSA with related messages” Eurocrypt '96.Google Scholar
  10. [FIPS]
    Federal Information Processing Standard 140-1, National Institute of Standards and TechnologyGoogle Scholar
  11. [HM95]
    DN Heer and DP Maher, “The Heart of the New Information Appliance”, IEEE Transactions on Consumer Electronics, August, 1995.Google Scholar
  12. [LEN96]
    Àrjen Lenstra, Citibank internal memoGoogle Scholar
  13. [LT96]
    London Telegraph, November 19, 1996, Page 1Google Scholar
  14. [Mc94]
    John McCormac, European Scrambling Systems — Circuits, Tactics, and Techniques, Waterford University Press, 1994Google Scholar
  15. [NYT96]
    New York Times, September 25, 1996, Page 1, business section.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • David P. Maher

There are no affiliations available

Personalised recommendations