{"id":"https://openalex.org/W4411157071","doi":"https://doi.org/10.46586/tches.v2025.i3.693-716","title":"Practical Opcode-based Fault Attack on AES-NI","display_name":"Practical Opcode-based Fault Attack on AES-NI","publication_year":2025,"publication_date":"2025-06-05","ids":{"openalex":"https://openalex.org/W4411157071","doi":"https://doi.org/10.46586/tches.v2025.i3.693-716"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2025.i3.693-716","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i3.693-716","pdf_url":"https://tosc.iacr.org/index.php/TCHES/article/download/12231/12038","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tosc.iacr.org/index.php/TCHES/article/download/12231/12038","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100557668","display_name":"Gong Xue","orcid":"https://orcid.org/0009-0003-3947-9370"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xue Gong","raw_affiliation_strings":["School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, 310027, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, 310027, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xin Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Zhang","raw_affiliation_strings":["School of Software and Microelectronics, Peking University, Beijing 100871, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Microelectronics, Peking University, Beijing 100871, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000763204","display_name":"Qianmei Wu","orcid":"https://orcid.org/0009-0007-2596-2221"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianmei Wu","raw_affiliation_strings":["School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, 310027, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, 310027, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056836597","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0002-4660-4163"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, 310027, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, 310027, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016880637","display_name":"Junge Xu","orcid":"https://orcid.org/0000-0003-0401-3135"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junge Xu","raw_affiliation_strings":["School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, 310027, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, 310027, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035938543","display_name":"Qingni Shen","orcid":"https://orcid.org/0000-0002-0605-6043"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingni Shen","raw_affiliation_strings":["School of Software and Microelectronics, Peking University, Beijing 100871, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Microelectronics, Peking University, Beijing 100871, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100410710","display_name":"Zhi Zhang","orcid":"https://orcid.org/0000-0003-3604-5369"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhi Zhang","raw_affiliation_strings":["Department of Computer Science and Software Engineering, University of Western Australia, Perth, WA 6009, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, University of Western Australia, Perth, WA 6009, Australia","institution_ids":["https://openalex.org/I177877127"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100557668"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15271399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2025","issue":"3","first_page":"693","last_page":"716"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/opcode","display_name":"Opcode","score":0.7063356041908264},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.5299369096755981},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.44385865330696106},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3277958631515503},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1274748146533966},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.12448224425315857},{"id":"https://openalex.org/keywords/seismology","display_name":"Seismology","score":0.07868757843971252}],"concepts":[{"id":"https://openalex.org/C52173422","wikidata":"https://www.wikidata.org/wiki/Q766483","display_name":"Opcode","level":2,"score":0.7063356041908264},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.5299369096755981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.44385865330696106},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3277958631515503},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1274748146533966},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.12448224425315857},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.07868757843971252}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.46586/tches.v2025.i3.693-716","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i3.693-716","pdf_url":"https://tosc.iacr.org/index.php/TCHES/article/download/12231/12038","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire/4e3c9267-39cf-4dfd-b656-6a74806a357c","is_oa":true,"landing_page_url":"https://admin.research-repository.uwa.edu.au/en/publications/4e3c9267-39cf-4dfd-b656-6a74806a357c","pdf_url":null,"source":{"id":"https://openalex.org/S4306402523","display_name":"UWA Profiles and Research Repository (University of Western Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177877127","host_organization_name":"The University of Western Australia","host_organization_lineage":["https://openalex.org/I177877127"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Gong, X, Zhang, X, Wu, Q, Zhang, F, Xu, J, Shen, Q & Zhang, Z 2025, 'Practical Opcode-based Fault Attack on AES-NI', IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2025, no. 3, pp. 693-716. https://doi.org/10.46586/tches.v2025.i3.693-716","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:5fd922742a3043398ed24353dba477bc","is_oa":true,"landing_page_url":"https://doaj.org/article/5fd922742a3043398ed24353dba477bc","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 3 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2025.i3.693-716","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2025.i3.693-716","pdf_url":"https://tosc.iacr.org/index.php/TCHES/article/download/12231/12038","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411157071.pdf","grobid_xml":"https://content.openalex.org/works/W4411157071.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2004101185","https://openalex.org/W2046404690","https://openalex.org/W4200046519","https://openalex.org/W2347098755","https://openalex.org/W2794638429","https://openalex.org/W2600055486","https://openalex.org/W2775473347"],"abstract_inverted_index":{"AES":[0,15,85,213],"New":[1],"Instructions":[2],"(AES-NI)":[3],"is":[4,193],"a":[5,50,70,100,140,243,250],"set":[6],"of":[7,54,60,66,115,125,173,182],"hardware":[8],"instructions":[9,67],"introduced":[10],"by":[11,38,171,185],"Intel":[12],"to":[13,76,83,110,137,164,195,208,233],"accelerate":[14],"encryption":[16],"and":[17,92,127,152,175,199,221,248,252],"decryption,":[18],"significantly":[19],"improving":[20],"efficiency":[21],"across":[22],"various":[23],"cryptographic":[24,260],"applications.":[25],"While":[26],"AES-NI":[27,247],"effectively":[28],"mitigates":[29],"certain":[30],"side-channel":[31],"attacks,":[32],"its":[33],"resilience":[34],"against":[35,258],"faults":[36],"induced":[37],"active":[39],"or":[40],"malicious":[41],"fault":[42],"injection":[43],"remains":[44],"unclear.In":[45],"this":[46],"paper,":[47],"we":[48,62,154,178],"conduct":[49],"comprehensive":[51],"security":[52],"analysis":[53],"AES-NI.":[55],"By":[56],"analyzing":[57],"the":[58,112,116,133,147,156,168,180,238],"opcodes":[59,198],"AES-NI,":[61],"identify":[63],"six":[64],"pairs":[65],"with":[68,122,237],"only":[69],"single-bit":[71],"difference,":[72],"making":[73],"them":[74],"susceptible":[75],"bit-flip-type":[77],"attacks.":[78,190],"This":[79,240],"vulnerability":[80,245],"allows":[81],"attackers":[82],"recover":[84,209],"keys":[86,211],"in":[87,246],"both":[88],"Electronic":[89],"Codebook":[90],"(ECB)":[91],"Cipher":[93],"Block":[94],"Chaining":[95],"(CBC)":[96],"modes.":[97],"We":[98],"introduce":[99],"novel":[101,253],"Opcode-based":[102,158],"Fault":[103,159],"Analysis":[104,160],"(OFA)":[105],"method,":[106],"employing":[107],"Gaussian":[108],"elimination":[109],"reduce":[111,132,146],"search":[113,135],"space":[114,136,149,170],"last":[117],"round":[118],"key.":[119],"In":[120],"particular,":[121],"one":[123],"pair":[124],"correct":[126],"faulty":[128],"ciphertexts,":[129],"OFA":[130,200],"can":[131,227],"key":[134,142,148,169,225],"232":[138],"for":[139,150,218,255],"128-bit":[141],"length.":[143],"To":[144],"further":[145],"AES-192":[151],"AES-256,":[153],"propose":[155],"Enhanced":[157],"(EOFA),":[161],"which,":[162],"compared":[163],"exhaustive":[165],"search,":[166],"reduces":[167],"factors":[172],"2160":[174],"2192,":[176],"respectively.Finally,":[177],"demonstrate":[179,223],"feasibility":[181],"our":[183],"findings":[184],"conducting":[186],"physical":[187],"endto-":[188],"end":[189],"Specifically,":[191],"Rowhammer":[192],"leveraged":[194],"flip":[196],"vulnerable":[197],"as":[201,203],"well":[202],"EOFA":[204],"techniques":[205],"are":[206],"applied":[207],"secret":[210],"from":[212],"implementations.":[214,261],"Our":[215],"experimental":[216],"results":[217],"AES-ECB-128,":[219],"AES-ECB-192,":[220],"AES-CBC-128":[222],"that":[224],"recovery":[226],"be":[228],"efficiently":[229],"achieved":[230],"within":[231],"1.03":[232],"1.36":[234],"hours,":[235],"varying":[236],"cipher.":[239],"work":[241],"highlights":[242],"critical":[244],"outlines":[249],"new":[251],"pathway":[254],"fault-based":[256],"attacks":[257],"modern":[259]},"counts_by_year":[],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
