SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing

被引:17
|
作者
Danial, Josef [1 ]
Das, Debayan [1 ]
Ghosh, Santosh [2 ]
Raychowdhury, Arijit [3 ]
Sen, Shreyas [1 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47906 USA
[2] Intel Corp, Hillsboro, OR 97124 USA
[3] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
End-to-end EM SCA attack; low-cost EM scanning; automated framework; SCNIFFER; POWER ANALYSIS;
D O I
10.1109/ACCESS.2020.3025022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electromagnetic (EM) side-channel analysis (SCA) is a prominent tool to break mathematically-secure cryptographic engines, especially on resource-constrained devices. Presently, to perform EM SCA on an embedded device, the entire chip is manually scanned and the MTD (Minimum Traces to Disclosure) analysis is performed at each point on the chip to reveal the secret key of the encryption algorithm. However, an automated end-to-end framework for EM leakage localization, trace acquisition, and attack has been missing. This work proposes SCNIFFER: a low-cost, automated EM Side Channel leakage SNIFFing platform to perform efficient end-to-end Side-Channel attacks. Using a leakage measure such as Test Vector Leakage Assessment (TVLA), or the signal to noise ratio (SNR), we propose a greedy gradient-search heuristic that converges to one of the points of highest EM leakage on the chip (dimension: N x N) within O(N) iterations, and then perform Correlational EM Analysis (CEMA) at that point. This reduces the CEMA attack time by similar to N times compared to an exhaustive MTD analysis, and by >20 x compared to choosing an attack location at random. We demonstrate SCNIFFER using a low-cost custombuilt 3-D scanner with an H-field probe (<$500) compared to >$50; 000 commercial EM scanners, and a variety of microcontrollers as the devices under attack. The SCNIFFER framework is evaluated for several cryptographic algorithms (AES-128, DES, RSA) running on both an 8-bit Atmega microcontroller and a 32-bit ARM microcontroller to find a point of high leakage and then perform a CEMA at that point.
引用
收藏
页码:173414 / 173427
页数:14
相关论文
共 50 条
  • [41] Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks
    Perin, Guilherme
    Imbert, Laurent
    Torres, Lionel
    Maurine, Philippe
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 200 - 215
  • [42] PRIMER: Profiling Interrupts Using Electromagnetic Side-Channel for Embedded Devices
    Dey, Moumita
    Yilmaz, Baki Berkay
    Prvulovic, Milos
    Zajic, Alenka
    IEEE TRANSACTIONS ON COMPUTERS, 2021, 71 (08) : 1824 - 1838
  • [43] Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis
    Sayakkara, Asanka P.
    Le-Khac, Nhien-An
    IEEE ACCESS, 2021, 9 : 13237 - 13247
  • [44] Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks
    Kadloor, Sachin
    Gong, Xun
    Kiyavash, Negar
    Tezcan, Tolga
    Borisov, Nikita
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [45] Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets
    Sayakkara, Asanka P.
    Le-Khac, Nhien-An
    IEEE ACCESS, 2021, 9 : 113585 - 113598
  • [46] An Efficient Memory Zeroization Technique Under Side-Channel Attacks
    Srivastava, Ankush
    Ghosh, Prokash
    2019 32ND INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2019 18TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2019, : 76 - 81
  • [47] Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended
    Bronchain, Olivier
    Durvaux, Francois
    Masure, Loic
    Standaert, Francois-Xavier
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 574 - 584
  • [48] Efficient Side-Channel Secure Message Authentication with Better Bounds
    Guo, Chun
    Standaert, Francois-Xavier
    Wang, Weijia
    Yu, Yu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 23 - 53
  • [49] Encoding Power Traces as Images for Efficient Side-Channel Analysis
    Hettwer, Benjamin
    Horn, Tobias
    Gehrer, Stefan
    Gueneysu, Tim
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2020, : 46 - 56
  • [50] Automated design of cryptographic devices resistant to multiple side-channel attacks
    Kulikowski, Konrad
    Smirnov, Alexander
    Taubin, Alexander
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 399 - 413