Loading...
Please wait, while we are loading the content...
Similar Documents
Locating Side Channel Leakage in Time through Matched Filters
| Content Provider | MDPI |
|---|---|
| Author | Barenghi, Alessandro Falcetti, Gioele Pelosi, Gerardo |
| Copyright Year | 2022 |
| Description | Side channel attacks provide an effective way to extract secret information from the execution of cryptographic algorithms run on a variety of computing devices. One of the crucial steps for a side channel attack to s쳮d is the capability to locate the time instant in which the cryptographic primitive being attacked is effectively leaking information on the side channel itself, and synchronize the data obtained from the measurements on that instant. In this work, we propose an efficient and effective solution relying on the digital signal processing technique known as matched filters. We derive our matched filter with a small amount of profiling information which can be obtained from a device matching the one under attack. Our technique reliably identifies the cryptographic operation being computed, even when system interrupts or software multithreading are enabled on our target platform. We validate our approach through a successful attack against an unprotected AES implementation running on a Cortex-M4-based microcontroller. |
| Starting Page | 26 |
| e-ISSN | 2410387X |
| DOI | 10.3390/cryptography6020026 |
| Journal | Cryptography |
| Issue Number | 2 |
| Volume Number | 6 |
| Language | English |
| Publisher | MDPI |
| Publisher Date | 2022-05-30 |
| Access Restriction | Open |
| Subject Keyword | Cryptography Hardware and Architecturee Side Channel Attacks Electromagnetic Emission Attacks Localization of Cipher Computation Computer Security |
| Content Type | Text |
| Resource Type | Article |