SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing

被引:19
|
作者
Danial, Josef [1 ]
Das, Debayan [1 ]
Ghosh, Santosh [2 ]
Raychowdhury, Arijit [3 ]
Sen, Shreyas [1 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47906 USA
[2] Intel Corp, Hillsboro, OR 97124 USA
[3] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
End-to-end EM SCA attack; low-cost EM scanning; automated framework; SCNIFFER; POWER ANALYSIS;
D O I
10.1109/ACCESS.2020.3025022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electromagnetic (EM) side-channel analysis (SCA) is a prominent tool to break mathematically-secure cryptographic engines, especially on resource-constrained devices. Presently, to perform EM SCA on an embedded device, the entire chip is manually scanned and the MTD (Minimum Traces to Disclosure) analysis is performed at each point on the chip to reveal the secret key of the encryption algorithm. However, an automated end-to-end framework for EM leakage localization, trace acquisition, and attack has been missing. This work proposes SCNIFFER: a low-cost, automated EM Side Channel leakage SNIFFing platform to perform efficient end-to-end Side-Channel attacks. Using a leakage measure such as Test Vector Leakage Assessment (TVLA), or the signal to noise ratio (SNR), we propose a greedy gradient-search heuristic that converges to one of the points of highest EM leakage on the chip (dimension: N x N) within O(N) iterations, and then perform Correlational EM Analysis (CEMA) at that point. This reduces the CEMA attack time by similar to N times compared to an exhaustive MTD analysis, and by >20 x compared to choosing an attack location at random. We demonstrate SCNIFFER using a low-cost custombuilt 3-D scanner with an H-field probe (<$500) compared to >$50; 000 commercial EM scanners, and a variety of microcontrollers as the devices under attack. The SCNIFFER framework is evaluated for several cryptographic algorithms (AES-128, DES, RSA) running on both an 8-bit Atmega microcontroller and a 32-bit ARM microcontroller to find a point of high leakage and then perform a CEMA at that point.
引用
收藏
页码:173414 / 173427
页数:14
相关论文
共 50 条
  • [41] Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack
    Wang, Chenguang
    Cai, Yici
    Wang, Haoyi
    Zhou, Qiang
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [42] Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks
    Perin, Guilherme
    Imbert, Laurent
    Torres, Lionel
    Maurine, Philippe
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 200 - 215
  • [43] Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks
    Kadloor, Sachin
    Gong, Xun
    Kiyavash, Negar
    Tezcan, Tolga
    Borisov, Nikita
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [44] Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis
    Sayakkara, Asanka P.
    Le-Khac, Nhien-An
    IEEE ACCESS, 2021, 9 : 13237 - 13247
  • [45] PRIMER: Profiling Interrupts Using Electromagnetic Side-Channel for Embedded Devices
    Dey, Moumita
    Yilmaz, Baki Berkay
    Prvulovic, Milos
    Zajic, Alenka
    IEEE TRANSACTIONS ON COMPUTERS, 2021, 71 (08) : 1824 - 1838
  • [46] Efficient Solution to Secure ECC Against Side-channel Attacks
    Wu Keke
    Li Huiyun
    Zhu Dingju
    Yu Fengqi
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 471 - 475
  • [47] Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets
    Sayakkara, Asanka P.
    Le-Khac, Nhien-An
    IEEE ACCESS, 2021, 9 : 113585 - 113598
  • [48] Efficient Side-Channel Secure Message Authentication with Better Bounds
    Guo, Chun
    Standaert, Francois-Xavier
    Wang, Weijia
    Yu, Yu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 23 - 53
  • [49] Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended
    Bronchain, Olivier
    Durvaux, Francois
    Masure, Loic
    Standaert, Francois-Xavier
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 574 - 584
  • [50] Encoding Power Traces as Images for Efficient Side-Channel Analysis
    Hettwer, Benjamin
    Horn, Tobias
    Gehrer, Stefan
    Gueneysu, Tim
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 46 - 56