The EM side-channel(s)

被引:0
|
作者
Agrawal, D [1 ]
Archambeault, B [1 ]
Rao, JR [1 ]
Rohatgi, P [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present results of a systematic investigation of leakage of compromising information via electromagnetic (EM) emanations from CMOS devices. These emanations are shown to consist of a multiplicity of signals, each leaking somewhat different information about the underlying computation. We show that not only can EM emanations be used to attack cryptographic devices where the power side-channel is unavailable, they can even be used to break power analysis countermeasures.
引用
收藏
页码:29 / 45
页数:17
相关论文
共 50 条
  • [21] High-Level Simulation of Embedded Software Vulnerabilities to EM Side-Channel Attacks
    Thimmaiah, Aditya
    Iyer, Vishnuvardhan V.
    Gerstlauer, Andreas
    Orshansky, Michael
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2022, 2022, 13511 : 155 - 170
  • [22] Remote Monitoring and Propagation Modeling of EM Side-Channel Signals for IoT Device Security
    Sangodoyin, Seun
    Werner, Frank
    Yilmaz, Baki B.
    Cheng, Chia-Lin
    Ugurlu, Elvan M.
    Sehatbakhsh, Nader
    Prvulovic, Milos
    Zajic, Alenka
    2020 14TH EUROPEAN CONFERENCE ON ANTENNAS AND PROPAGATION (EUCAP 2020), 2020,
  • [23] Performance-Aware Interconnect Delay Insertion Against EM Side-Channel Attacks
    Jiang, Minmin
    Pavlidis, Vasilis F.
    2021 ACM/IEEE INTERNATIONAL WORKSHOP ON SYSTEM-LEVEL INTERCONNECT PATHFINDING (SLIP 2021), 2021, : 25 - 32
  • [24] Improved EM Side-Channel Authentication Using Profile-Based XOR Model
    Kasuya, Momoka
    Sakiyama, Kazuo
    INFORMATION SECURITY APPLICATIONS, 2018, 10763 : 173 - 183
  • [25] Methodology for Complete Decorrelation of Power Supply EM Side-Channel Signal and Sensitive Data
    Jevtic, Ruzica
    Garcia Otero, Mariano
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (04) : 2256 - 2260
  • [26] Amplitude-modulated EM side-channel attack on provably secure masked AES
    Wang, Huanyu
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (03) : 537 - 549
  • [27] Mitigating EM Side-Channel Attacks with Dynamic Delay Insertion and Data Bus Inversion
    Jiang, Minmin
    Maragkoudaki, Eleni
    Pavlidis, Vasilis F.
    2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 1724 - 1728
  • [28] THz Near Field Focusing using Cassegranian Configuration for EM Side-channel Detection
    Juyal, Prateek
    Adibelli, Sinan
    Zajic, Alenka
    2018 IEEE ANTENNAS AND PROPAGATION SOCIETY INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION & USNC/URSI NATIONAL RADIO SCIENCE MEETING, 2018, : 1415 - 1416
  • [29] Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations
    Wang, Ruize
    Ngo, Kalle
    Dubrova, Elena
    2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 488 - 495
  • [30] Side-channel attack pitfalls
    Tiri, Kris
    2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 15 - 20