谷歌浏览器插件
订阅小程序
在清言上使用

Side-channel Attack Countermeasure Based on Power Supply Modulation.

Ruzica Jevtic,Pablo Perez-Tirador, Carmen Cabezaolias, Pablo Carnero,Gabriel Caffarena

2022 30th European Signal Processing Conference (EUSIPCO)(2022)

引用 0|浏览5
暂无评分
摘要
As the number of IoT devices grows exponentially every year, so do the security threats. Due to their mobility and limited size, power and performance, these devices are particu-larly vulnerable to side-channel attacks that are based on device physical leaks. In this paper, we modulate the power supply voltage to secure the devices against two types of side-channel attacks: differential and correlation power analysis attacks (DPA and CPA) that aim to reveal cryptographic secret key and attacks that process the leaked signal to obtain the information on the activity inside the device (e.g. identify the keystrokes when typing a password). We perform both types of attacks on a low-cost microcontroller used in a variety of IoT devices and find the most effective voltage modulation for both of the targeted attacks. The proposed countermeasure is easy to implement and does not require re-designing the microcontroller, thereby avoiding high costs of fabrication and testing. It is extremely effective against cryptographic attacks as it increases the minimum number of traces required to disclose (MTD) by two orders of magnitude. For non-cryptographic attacks the correlation coefficient between the leaked signal and the sensitive information is lowered by 33%.
更多
查看译文
关键词
side-channel attack countermeasure,power supply modulation,IoT devices,security threats,side-channel attacks,device physical leaks,power supply voltage,differential correlation power analysis attacks,cryptographic secret key,leaked signal,effective voltage modulation,targeted attacks,cryptographic attacks,noncryptographic attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要