SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing

被引:23
作者
Danial, Josef [1 ]
Das, Debayan [1 ]
Ghosh, Santosh [2 ]
Raychowdhury, Arijit [3 ]
Sen, Shreyas [1 ]
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47906 USA
[2] Intel Corp, Hillsboro, OR 97124 USA
[3] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
End-to-end EM SCA attack; low-cost EM scanning; automated framework; SCNIFFER; POWER ANALYSIS;
D O I
10.1109/ACCESS.2020.3025022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electromagnetic (EM) side-channel analysis (SCA) is a prominent tool to break mathematically-secure cryptographic engines, especially on resource-constrained devices. Presently, to perform EM SCA on an embedded device, the entire chip is manually scanned and the MTD (Minimum Traces to Disclosure) analysis is performed at each point on the chip to reveal the secret key of the encryption algorithm. However, an automated end-to-end framework for EM leakage localization, trace acquisition, and attack has been missing. This work proposes SCNIFFER: a low-cost, automated EM Side Channel leakage SNIFFing platform to perform efficient end-to-end Side-Channel attacks. Using a leakage measure such as Test Vector Leakage Assessment (TVLA), or the signal to noise ratio (SNR), we propose a greedy gradient-search heuristic that converges to one of the points of highest EM leakage on the chip (dimension: N x N) within O(N) iterations, and then perform Correlational EM Analysis (CEMA) at that point. This reduces the CEMA attack time by similar to N times compared to an exhaustive MTD analysis, and by >20 x compared to choosing an attack location at random. We demonstrate SCNIFFER using a low-cost custombuilt 3-D scanner with an H-field probe (<$500) compared to >$50; 000 commercial EM scanners, and a variety of microcontrollers as the devices under attack. The SCNIFFER framework is evaluated for several cryptographic algorithms (AES-128, DES, RSA) running on both an 8-bit Atmega microcontroller and a 32-bit ARM microcontroller to find a point of high leakage and then perform a CEMA at that point.
引用
收藏
页码:173414 / 173427
页数:14
相关论文
共 27 条
[1]  
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[2]  
Benadjila R., 2017, SECURE AES128 ATMEGA
[3]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[4]  
Cooper J., 2013, INT CRYPT MOD C
[5]  
Das D, 2019, PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P11, DOI 10.1109/HST.2019.8740839
[6]  
Gandolfi K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001. Third International Workshop. Proceedings (Lecture Notes in Computer Science Vol.2162), P251
[7]   ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs [J].
Genkin, Daniel ;
Pachmanov, Lev ;
Pipman, Itamar ;
Tromer, Eran .
TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 :219-235
[8]   Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation [J].
Genkin, Daniel ;
Pachmanov, Lev ;
Pipman, Itamar ;
Tromer, Eran .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :207-228
[9]  
Heyszl Johann, 2012, Smart Card Research and Advanced Applications. 11th International Conference (CARDIS 2012). Revised Selected Papers, P248, DOI 10.1007/978-3-642-37288-9_17
[10]  
Heyszl J, 2012, LECT NOTES COMPUT SC, V7178, P231, DOI 10.1007/978-3-642-27954-6_15