POSTER: Is Active Electromagnetic Side-channel Attack Practical?

被引:5
|
作者
Wakabayashi, Satohiro [1 ]
Maruyama, Seita [1 ]
Mori, Tatsuya [1 ]
Goto, Shigeki [1 ]
Kinugawa, Masahiro [2 ]
Hayashi, Yu-ichi [3 ]
机构
[1] Waseda Univ, Shinjuku Ku, Tokyo, Japan
[2] Sendai Coll, Natl Inst Technol, Sendai, Miyagi, Japan
[3] Nara Inst Sci & Technol, Nara, Japan
来源
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2017年
关键词
Active electromagnetic side-channel attack; Hardware security; RF retroreflector attack;
D O I
10.1145/3133956.3138830
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Radio-frequency (RF) retroreflector attack (RFRA) is an active electromagnetic side-channel attack that aims to leak the target's internal signals by irradiating the targeted device with a radio wave, where an attacker has embedded a malicious circuit (RF retroreflector) in the device in advance. As the retroreflector consists of small and cheap electrical elements such as a field-effect transistor (FET) chip and a wire that can work as a dipole antenna, the reflector can be embedded into various kinds of electric devices that carry unencrypted, sensitive information; e.g., keyboard, display monitor, microphone, speaker, USB, and so on. Only a few studies have addressed the basic mechanism of RFRA and demonstrated the success of the attack. The conditions for a successful attack have not been adequately explored before, and therefore, assessing the feasibility of the attack remains an open issue. In the present study, we aim to investigate empirically the conditions for a successful RFRA through field experiments. Understanding attack limitations should help to develop effective countermeasures against it. In particular, with regard to the conditions for a successful attack, we studied the distance between the attacker and the target, and the target signal frequencies. Through the extensive experiments using off-the-shelf hardware including software-defined radio (SDR) equipment, we revealed that the required conditions for a successful attack are (1) up to a 10-Mbps of target signal and (2) up to a distance of 10 meters. These results demonstrate the importance of the RFRA threat in the real world.
引用
收藏
页码:2587 / 2589
页数:3
相关论文
共 50 条
  • [1] Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack
    Wang, Chenguang
    Cai, Yici
    Wang, Haoyi
    Zhou, Qiang
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [2] Practical side-channel attack on a security device
    San Pedro, Manuel
    Servant, Victor
    Guillemet, Charles
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 130 - 133
  • [3] ThermalBleed: A Practical Thermal Side-Channel Attack
    Kim, Taehun
    Shin, Youngjoo
    IEEE ACCESS, 2022, 10 : 25718 - 25731
  • [4] Practical Side-Channel Attack on Message Encoding in Masked Kyber
    Wang, Jian
    Cao, Weigiong
    Chen, Hua
    Li, Haoyuan
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 882 - 889
  • [5] Side-channel attack pitfalls
    Tiri, Kris
    2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 15 - 20
  • [6] A Practical Side-Channel Attack of a LoRaWAN Module Using Deep Learning
    Xu, Jiming
    Tang, You
    Wang, Yujian
    Wang, Xin'an
    PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 17 - 21
  • [7] Side-channel trojan insertion - A practical foundry-side attack via ECO
    Perez, Tiago Diadami
    Imran, Malik
    Vaz, Pablo
    Pagliarini, Samuel
    arXiv, 2021,
  • [8] Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO
    Perez, Tiago
    Imran, Malik
    Vaz, Pablo
    Pagliarini, Samuel
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [9] Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks
    Perin, Guilherme
    Imbert, Laurent
    Torres, Lionel
    Maurine, Philippe
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 200 - 215
  • [10] Side-channel attack on substitution blocks
    Novak, R
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 307 - 318