USB powered devices: A survey of side-channel threats and countermeasures

被引:6
|
作者
Liu, Hao [1 ]
Spolaor, Riccardo [1 ]
Turrin, Federico [2 ]
Bonafede, Riccardo [3 ]
Conti, Mauro [2 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Qingdao, Peoples R China
[2] Univ Padua, Dept Math, Padua, Italy
[3] Univ Padua, Dept Informat Engn, Padua, Italy
来源
HIGH-CONFIDENCE COMPUTING | 2021年 / 1卷 / 01期
关键词
Smart devices; USB; Side-channel; Security; USAGE ANALYSIS; ATTACKS;
D O I
10.1016/j.hcc.2021.100007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent technological innovations lead to the rise of a plethora of portable electronic devices such as smartphones, small household appliances, and other IoT devices. To power or recharge the battery of such devices, manufac-turers identified in the ubiquitous Universal Serial Bus (USB) standard a convenient solution, as it enables both communication and energy supply. Unfortunately, the default trust on USB ports has been exploited by hackers to extract highly sensitive user data on such devices. Despite the efforts by security experts and manufacturers to detect and block this threat, an even more stealthy approach to undermine users privacy relies on side-channel attacks on the USB interface, such as electromagnetic emissions and power consumption.In this paper, we present a comprehensive survey of the state-of-the-art of side-channel analysis on the security of USB-powered devices. Differently from other surveys on USB-based attacks via the communication interface only, this survey considers research works that aim to infer or extract private information from the energy supply, the device itself, or unintentionally available functionalities. In particular, we consider this emergent trend of security work that was not previously considered in other surveys, such as the energy consumption and electromagnetic emission analyses, as well as Juice Filming Charging (JFC) attacks. We first analyze the physical properties of the side-channels and technical characteristics of such research work, we then summarize the countermeasures proposed in the state-of-the-art. Finally, we also identify some possible future directions to foster further research in this field.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks
    Gao, Pengfei
    Zhang, Yedi
    Song, Fu
    Chen, Taolue
    Standaert, Francois-Xavier
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [32] Towards High-Level Synthesis of Polymorphic Side-Channel Countermeasures
    Socha, Petr
    Novotny, Martin
    2020 23RD EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2020), 2020, : 193 - 199
  • [33] Side-Channel Analysis of a High-Throughput AES Peripheral with Countermeasures
    Heinz, Benedikt
    Heyszl, Johann
    Stumpf, Frederic
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 25 - 29
  • [34] Higher-Order DCA against Standard Side-Channel Countermeasures
    Bogdanov, Andrey
    Rivain, Matthieu
    Vejre, Philip S.
    Wang, Junwei
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 118 - 141
  • [35] Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks
    Perin, Guilherme
    Imbert, Laurent
    Torres, Lionel
    Maurine, Philippe
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 200 - 215
  • [36] Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures
    Richter-Brockmann, Jan
    Guneysu, Tim
    2020 IEEE 31ST INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2020), 2020, : 117 - 124
  • [37] Binary Ring-LWI-Hardware with Power Side-Channel Countermeasures
    Aysu, Aydin
    Orshansky, Michael
    Tiwari, Mohit
    PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 1253 - 1258
  • [38] Side-channel countermeasures’ dissection and the limits of closed source security evaluations
    Bronchain O.
    Standaert F.-X.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (02): : 1 - 25
  • [39] Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study
    Javeed, Arsalan
    Yilmaz, Cemal
    Savas, Erkay
    IEEE ACCESS, 2023, 11 : 48945 - 48976
  • [40] Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture
    Alahmadi, Adel N.
    Rehman, Saeed Ur
    Alhazmi, Husain S.
    Glynn, David G.
    Shoaib, Hatoon
    Sole, Patrick
    SENSORS, 2022, 22 (09)