USB powered devices: A survey of side-channel threats and countermeasures

被引:7
|
作者
Liu, Hao [1 ]
Spolaor, Riccardo [1 ]
Turrin, Federico [2 ]
Bonafede, Riccardo [3 ]
Conti, Mauro [2 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Qingdao, Peoples R China
[2] Univ Padua, Dept Math, Padua, Italy
[3] Univ Padua, Dept Informat Engn, Padua, Italy
来源
HIGH-CONFIDENCE COMPUTING | 2021年 / 1卷 / 01期
关键词
Smart devices; USB; Side-channel; Security; USAGE ANALYSIS; ATTACKS;
D O I
10.1016/j.hcc.2021.100007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent technological innovations lead to the rise of a plethora of portable electronic devices such as smartphones, small household appliances, and other IoT devices. To power or recharge the battery of such devices, manufac-turers identified in the ubiquitous Universal Serial Bus (USB) standard a convenient solution, as it enables both communication and energy supply. Unfortunately, the default trust on USB ports has been exploited by hackers to extract highly sensitive user data on such devices. Despite the efforts by security experts and manufacturers to detect and block this threat, an even more stealthy approach to undermine users privacy relies on side-channel attacks on the USB interface, such as electromagnetic emissions and power consumption.In this paper, we present a comprehensive survey of the state-of-the-art of side-channel analysis on the security of USB-powered devices. Differently from other surveys on USB-based attacks via the communication interface only, this survey considers research works that aim to infer or extract private information from the energy supply, the device itself, or unintentionally available functionalities. In particular, we consider this emergent trend of security work that was not previously considered in other surveys, such as the energy consumption and electromagnetic emission analyses, as well as Juice Filming Charging (JFC) attacks. We first analyze the physical properties of the side-channels and technical characteristics of such research work, we then summarize the countermeasures proposed in the state-of-the-art. Finally, we also identify some possible future directions to foster further research in this field.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] A Comparative Study Across Static and Dynamic Side-Channel Countermeasures
    Yuri, Gil Dantas
    Hamann, Tobias
    Mantel, Heiko
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 173 - 189
  • [22] Micro-architectural Cache Side-Channel Attacks and Countermeasures
    Shen, Chaoqun
    Chen, Congcong
    Zhang, Jiliang
    2021 26TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2021, : 441 - 448
  • [23] FPGA Implementations of SPRING And Their Countermeasures against Side-Channel Attacks
    Brenner, Hai
    Gaspar, Lubos
    Leurent, Gaetan
    Rosen, Alon
    Standaert, Francois-Xavier
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 414 - 432
  • [24] Formal Verification of Software Countermeasures against Side-Channel Attacks
    Eldib, Hassan
    Wang, Chao
    Schaumont, Patrick
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
  • [25] Plaintext: A missing feature for enhancing the power of deep learning in side-channel analysis? Breaking multiple layers of side-channel countermeasures
    Hoang A.-T.
    Hanley N.
    O’Neill M.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2020 (04): : 49 - 85
  • [26] Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures
    Su, Chao
    Zeng, Qingkai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [27] Side-Channel Attacks Detection Methods: A Survey
    Assaeedi, Joanna
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 288 - 296
  • [28] A Study of Timing Side-Channel Attacks and Countermeasures on Java']JavaScript and WebAssembly
    Mazaheri, Mohammad Erfan
    Sarmadi, Siavash Bayat
    Ardakani, Farhad Taheri
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (01): : 1 - 20
  • [29] Formal verification of side-channel countermeasures using self-composition
    Bacelar Almeida, J.
    Barbosa, Manuel
    Pinto, Jorge S.
    Vieira, Barbara
    SCIENCE OF COMPUTER PROGRAMMING, 2013, 78 (07) : 796 - 812
  • [30] Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture
    Chen, Qi
    Zhao, Dongyan
    Liu, Liang
    Yan, Xuesong
    Yuan, Yidong
    Zhang, Xige
    Wu, Hongmei
    Wang, Zhe
    COMPUTER STANDARDS & INTERFACES, 2022, 80