RASCv2: Enabling Remote Access to Side-Channels for Mission Critical and IoT Systems

被引:3
作者
Bai, Yunkai [1 ]
Stern, Andrew [1 ]
Park, Jungmin [1 ]
Tehranipoor, Mark [1 ]
Forte, Domenic [1 ]
机构
[1] Univ Florida, 601 Gale Lemerand Dr, Gainesville, FL 32611 USA
关键词
Side-channel analysis; power; electromagnetic radiation; AES; buffer overflow; code injection; return-oriented program;
D O I
10.1145/3524123
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) and smart devices are currently being deployed in systems such as autonomous vehicles and medical monitoring devices. The introduction of IoT devices into these systems enables network connectivity for data transfer, cloud support, and more, but can also lead to malware injection. Since many IoT devices operate in remote environments, it is also difficult to protect them from physical tampering. Conventional protection approaches rely on software. However, these can be circumvented by the moving target nature of malware or through hardware attacks. Alternatively, insertion of the internal monitoring circuits into IoT chips requires a design trade-off, balancing the requirements of the monitoring circuit and the main circuit. A very promising approach to detecting anomalous behavior in the IoT and other embedded systems is side-channel analysis. To date, however, this can be performed only before deployment due to the cost and size of side-channel setups (e.g., and oscilloscopes, probes) or by internal performance counters. Here, we introduce an external monitoring printed circuit board (PCB) named RASC to provide remote access to side-channels. RASC reduces the complete side-channel analysis system into two small PCBs (2 x 2 cm), providing the ability to monitor power and electromagnetic (EM) traces of the target device. Additionally, RASC can transmit data and/or alerts of anomalous activities detected to a remote host through Bluetooth. To demonstrate RASCs capabilities, we extract keys from encryption modules such as AES implemented on Arduino and FPGA boards. To illustrate RASC's defensive capabilities, we also use it to perform malware detection. RASC's success in power analysis is comparable to an oscilloscope/probe setup but is lightweight and two orders of magnitude cheaper.
引用
收藏
页数:25
相关论文
共 50 条
[1]  
Anandakumar N. N., 2012, INT C COMPUTATIONAL, P683, DOI [10.1145/2393216.2393330, DOI 10.1145/2393216.2393330]
[2]  
[Anonymous], 2017, IACR Cryptology ePrint Archive
[3]  
[Anonymous], 2014, ANDROID RANSOM KOLER
[4]  
[Anonymous], 2008, GPCODE AK RANSOMWARE
[5]  
[Anonymous], 2014, CTB LOCKER CURVE TOR
[6]  
[Anonymous], 2011, 8 INT MULTICONFERENC
[7]  
[Anonymous], 2015, LOCKERPIN RANSOMWARE
[8]  
[Anonymous], SAKURA-G
[9]  
Bazzoli Fred, 2020, HLTHCARE IT NEWS
[10]  
Becker G., 2013, INT CRYPTOGRAPHIC MO