Practical side-channel attack on a security device

被引:0
作者
San Pedro, Manuel [1 ]
Servant, Victor [1 ]
Guillemet, Charles [1 ]
机构
[1] Ledger Donjon, Paris, France
来源
31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019) | 2019年
关键词
D O I
10.1109/icm48031.2019.9021685
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper demonstrates how to mount a side-channel attack on a security device: a cryptocurrency hardware wallet. Our study led to sensitive user data extraction, and was responsibly disclosed to the vendor who was able to patch its firmware. We explain here what we did and the tool we used to extract a user PIN from the device.
引用
收藏
页码:130 / 133
页数:4
相关论文
共 11 条
[1]  
Bhasin S., NICV NORMALIZED INTE
[2]  
Chari S., 2003, TEMPLATE ATTACKS
[3]  
Gandolfi K., 2001, ELECTROMAGNETIC ANAL
[4]  
Hastie T., 2009, Springer Series in Statistics, DOI DOI 10.1007/B94608
[5]  
Hospodar G., 2011, MACHINE LEARNING SID
[6]  
Karsmakers P., 2019, SIDE CHANNEL ATTACKS
[7]  
Kocher P., 1999, Differential power analysis
[8]  
Kocher P. C., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P104
[9]  
Kreder K., 2017, HARDWARE WALLET VULN
[10]  
Maghrebi Houssem, 2016, Security, Privacy and Applied Cryptography Engineering. 6th International Conference, SPACE 2016. Proceedings: LNCS 10076, P3, DOI 10.1007/978-3-319-49445-6_1