1. SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing
- Author
-
Debayan Das, Josef Danial, Santosh Ghosh, Shreyas Sen, and Arijit Raychowdhury
- Subjects
FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,General Computer Science ,business.industry ,Computer science ,General Engineering ,End-to-end EM SCA attack ,Cryptography ,low-cost EM scanning ,02 engineering and technology ,automated framework ,Encryption ,020202 computer hardware & architecture ,SCNIFFER ,Test vector ,Attack time ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,General Materials Science ,Side channel attack ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,Cryptography and Security (cs.CR) ,lcsh:TK1-9971 ,Computer hardware - Abstract
Electromagnetic (EM) side-channel analysis (SCA) is a prominent tool to break mathematically-secure cryptographic engines, especially on resource-constrained devices. Presently, to perform EM SCA on an embedded device, the entire chip is manually scanned and the MTD (Minimum Traces to Disclosure) analysis is performed at each point on the chip to reveal the secret key of the encryption algorithm. However, an automated end-to-end framework for EM leakage localization, trace acquisition, and attack has been missing. This work proposes SCNIFFER : a low-cost, automated EM Side Channel leakage SNIFFing platform to perform efficient end-to-end Side-Channel attacks. Using a leakage measure such as Test Vector Leakage Assessment (TVLA), or the signal to noise ratio (SNR), we propose a greedy gradient-search heuristic that converges to one of the points of highest EM leakage on the chip (dimension: $N \times N$ ) within $O(N)$ iterations, and then perform Correlational EM Analysis (CEMA) at that point. This reduces the CEMA attack time by $\sim N$ times compared to an exhaustive MTD analysis, and by $> 20\times $ compared to choosing an attack location at random. We demonstrate SCNIFFER using a low-cost custom-built 3-D scanner with an H-field probe ( $50, 000 commercial EM scanners, and a variety of microcontrollers as the devices under attack. The SCNIFFER framework is evaluated for several cryptographic algorithms (AES-128, DES, RSA) running on both an 8-bit Atmega microcontroller and a 32-bit ARM microcontroller to find a point of high leakage and then perform a CEMA at that point.
- Published
- 2020