AUTHOREA
Log in Sign Up Browse Preprints
LOG IN SIGN UP
Cuiping Shao
Cuiping Shao

Public Documents 2
Lattice-based fault attack and defensive strategies targeting the SM2 Signature Algor...
Cuiping Shao
Wenzhe Li

Cuiping Shao

and 3 more

September 02, 2024
Fault injection attacks can compromise cryptographic operations with out the necessity of physical alteration, thereby potentially disclosing private keys, which poses a grave threat to the security of elliptic curve digital signature algorithms. This letter presents an efficient and prac tical lattice-based fault injection attack on the SM2 digital signature algorithm (SM2-DSA), along with the corresponding defense strategy. The proposed attack method significantly reduces the moment precision requirements compared to existing lattice-based fault attacks, while also demonstrating computational advantages over other fault attacks. From the defensive perspective, the proposed strategy effectively defend against the lattice-based fault injection attacks while minimizing both time and spatial overheads. Specifically, our countermeasure incurs only a 0.8% time overhead and the area overhead for secure design does not exceed 1%. Our research provides valuable insights for evaluating the security of hardware implementations of SM2-DSA.
Anomaly recognition method of perception system for autonomous vehicles based on dist...
Cuiping Shao
Beizhang Chen

Cuiping Shao

and 4 more

April 14, 2022
Environmental perception system is the premise of the safety and stability of the autonomous vehicle system. However, studies have shown that the on-board sensors included in the perception system are extremely vulnerable to external attacks and interference, leading to incorrect driving strategies and bringing great security threats. Aiming at the problem, this paper divides the vehicle-mounted sensors into a positioning group and an identification group according to their role in the perception system. Then, based on the information correlation between sensors in the same group and the information correlation of a single sensor on adjacent time series, the distance metric model between sensors in a group and the distance metric model for each sensor of this group on time series is established. And the normal distance intervals corresponding to the confidence interval are calculated respectively. According to the distance metric model between sensors, we can detect anomalies in the perception system in real-time. Further, according to the distance metric model for each sensor on adjacent time series, we can identify anomaly sensors. Our experimental results quantitatively show that the method achieves real-time anomaly recognition, and demonstrate the effectiveness and robustness of the method on the open-source KITTI dataset.

| Powered by Authorea.com

  • Home