The EM side-channel(s)

被引:0
|
作者
Agrawal, D [1 ]
Archambeault, B [1 ]
Rao, JR [1 ]
Rohatgi, P [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present results of a systematic investigation of leakage of compromising information via electromagnetic (EM) emanations from CMOS devices. These emanations are shown to consist of a multiplicity of signals, each leaking somewhat different information about the underlying computation. We show that not only can EM emanations be used to attack cryptographic devices where the power side-channel is unavailable, they can even be used to break power analysis countermeasures.
引用
收藏
页码:29 / 45
页数:17
相关论文
共 50 条
  • [1] Efficient Simulation of EM Side-Channel Attack Resilience
    Kumar, Amit
    Scarborough, Cody
    Yilmaz, Ali
    Orshansky, Michael
    2017 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2017, : 123 - 130
  • [2] Killing EM Side-Channel Leakage at its Source
    Das, Debayan
    Nath, Mayukh
    Ghosh, Santosh
    Sen, Shreyas
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 1108 - 1111
  • [3] A Compact Probe for EM Side-Channel Attacks on Cryptographic Systems
    Werner, Frank T.
    Djordjevic, Antonije R.
    Zajic, Alenka G.
    2019 IEEE INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION AND USNC-URSI RADIO SCIENCE MEETING, 2019, : 613 - 614
  • [4] Leveraging EM Side-Channel Information to Detect Rowhammer Attacks
    Zhang, Zhenkai
    Zhan, Zihao
    Balasubramanian, Daniel
    Li, Bo
    Volgyesi, Peter
    Koutsoukos, Xenofon
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 729 - 746
  • [5] Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack
    Wang, Chenguang
    Cai, Yici
    Wang, Haoyi
    Zhou, Qiang
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [6] Capacity of the EM Covert/Side-Channel Created by the Execution of Instructions in a Processor
    Yilmaz, Baki Berkay
    Callan, Robert L.
    Prvulovic, Milos
    Zajic, Alenka
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 605 - 620
  • [7] Weighted Key Enumeration for EM-based Side-Channel Attacks
    Li, Yang
    Meng, Xiaohan
    Wang, Shuang
    Wang, Jian
    2018 JOINT IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY AND 2018 IEEE ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC/APEMC), 2018, : 749 - 752
  • [8] Checking Robustness Against EM Side-Channel Attacks Prior to Manufacturing
    Poggi, Davide
    Ordas, Thomas
    Sarafianos, Alexandre
    Maurine, Philippe
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (05) : 1264 - 1275
  • [9] Potential of Unsupervised Deep Learning for Detection of EM Side-Channel Attacks
    Ghimire, Ashutosh
    Singh, Harshdeep
    Bhatta, Niraj Prasad
    Amsaad, Fathi
    2023 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS, PAINE, 2023, : 60 - 65
  • [10] Implications of Distributed On-Chip Power Delivery on EM Side-Channel Attacks
    Khan, Ahmed Waheed
    Wanchoo, Tanya
    Mumcu, Gokhan
    Kose, Selcuk
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 329 - 336