Practical side-channel attack on a security device

被引:0
|
作者
San Pedro, Manuel [1 ]
Servant, Victor [1 ]
Guillemet, Charles [1 ]
机构
[1] Ledger Donjon, Paris, France
关键词
D O I
10.1109/icm48031.2019.9021685
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper demonstrates how to mount a side-channel attack on a security device: a cryptocurrency hardware wallet. Our study led to sensitive user data extraction, and was responsibly disclosed to the vendor who was able to patch its firmware. We explain here what we did and the tool we used to extract a user PIN from the device.
引用
收藏
页码:130 / 133
页数:4
相关论文
共 50 条
  • [1] ThermalBleed: A Practical Thermal Side-Channel Attack
    Kim, Taehun
    Shin, Youngjoo
    [J]. IEEE ACCESS, 2022, 10 : 25718 - 25731
  • [2] POSTER: Is Active Electromagnetic Side-channel Attack Practical?
    Wakabayashi, Satohiro
    Maruyama, Seita
    Mori, Tatsuya
    Goto, Shigeki
    Kinugawa, Masahiro
    Hayashi, Yu-ichi
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2587 - 2589
  • [3] Side-channel security of practical quantum key distribution
    Jiang, Cong
    Hu, Xiao-Long
    Yu, Zong-Wen
    Wang, Xiang-Bin
    [J]. PHYSICAL REVIEW RESEARCH, 2024, 6 (01):
  • [4] Practical Side-Channel Attack on Message Encoding in Masked Kyber
    Wang, Jian
    Cao, Weigiong
    Chen, Hua
    Li, Haoyuan
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 882 - 889
  • [5] A Study on Information Security Attack based Side-Channel Attacks
    Kang, Young-Jin
    Bruce, Ndibanje
    Park, SuHyun
    Lee, HoonJae
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 61 - 65
  • [6] Side-channel attack pitfalls
    Tiri, Kris
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 15 - 20
  • [7] A Practical Side-Channel Attack of a LoRaWAN Module Using Deep Learning
    Xu, Jiming
    Tang, You
    Wang, Yujian
    Wang, Xin'an
    [J]. PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 17 - 21
  • [8] Side-channel trojan insertion - A practical foundry-side attack via ECO
    Perez, Tiago Diadami
    Imran, Malik
    Vaz, Pablo
    Pagliarini, Samuel
    [J]. arXiv, 2021,
  • [9] Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO
    Perez, Tiago
    Imran, Malik
    Vaz, Pablo
    Pagliarini, Samuel
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [10] Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack
    Golder, Anupam
    Das, Debayan
    Danial, Josef
    Ghosh, Santosh
    Sen, Shreyas
    Raychowdhury, Arijit
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) : 2720 - 2733