Side-channel attack countermeasure based on power supply modulation

Jevtic Novakovic, Ruzica ORCID: https://orcid.org/0000-0002-5261-5491, Pérez Tirador, Pablo ORCID: https://orcid.org/0000-0002-8912-3423, Cabezaolias López, Carmen ORCID: https://orcid.org/0009-0008-7488-1548, Carnero, Pablo and Caffarena Fernández, Gabriel ORCID: https://orcid.org/0000-0002-2902-3869 (2022). Side-channel attack countermeasure based on power supply modulation. En: "30th European Signal Processing Conference (EUSIPCO)", 29/08/2022-02/09/2022, Belgrado, Serbia. p. 5. https://doi.org/10.23919/eusipco55093.2022.9909766.

Descripción

Título: Side-channel attack countermeasure based on power supply modulation
Autor/es:
Tipo de Documento: Ponencia en Congreso o Jornada (Artículo)
Título del Evento: 30th European Signal Processing Conference (EUSIPCO)
Fechas del Evento: 29/08/2022-02/09/2022
Lugar del Evento: Belgrado, Serbia
Título del Libro: 30th European Signal Processing Conference (EUSIPCO)
Fecha: 1 Septiembre 2022
ISSN: 20761465
Materias:
Palabras Clave Informales: Performance evaluation; power supplies; microcontrollers; modulation; voltage; side-channel attacks; passwords
Escuela: E.T.S.I. Telecomunicación (UPM)
Departamento: Ingeniería Electrónica
Licencias Creative Commons: Reconocimiento - Sin obra derivada - No comercial

Texto completo

[thumbnail of 10308944.pdf] PDF (Portable Document Format) - Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB)

Resumen

As the number of IoT devices grows exponentially every year, so do the security threats. Due to their mobility and limited size, power and performance, these devices are particularly vulnerable to side-channel attacks that are based on device physical leaks. In this paper, we modulate the power supply voltage to secure the devices against two types of side-channel attacks: differential and correlation power analysis attacks (DPA and CPA) that aim to reveal cryptographic secret key and attacks that process the leaked signal to obtain the information on the activity inside the device (e.g. identify the keystrokes when typing a password). We perform both types of attacks on a low-cost microcontroller used in a variety of IoT devices and find the most effective voltage modulation for both of the targeted attacks. The proposed countermeasure is easy to implement and does not require re-designing the microcontroller, thereby avoiding high costs of fabrication and testing. It is extremely effective against cryptographic attacks as it increases the minimum number of traces required to disclose (MTD) by two orders of magnitude. For non-cryptographic attacks the correlation coefficient between the leaked signal and the sensitive information is lowered by 33%.

Proyectos asociados

Tipo
Código
Acrónimo
Responsable
Título
Gobierno de España
RTI2018-095324-B-I00
Sin especificar
Sin especificar
Gestión adaptativa y proactiva de la enfermedad crónica mediante una plataforma vestible
Gobierno de España
IDI-20210468
FLYING DRONES
Sin especificar
Codificación de vídeo real-time para la conducción de drones de alta velocidad

Más información

ID de Registro: 86785
Identificador DC: https://oa.upm.es/86785/
Identificador OAI: oai:oa.upm.es:86785
URL Portal Científico: https://portalcientifico.upm.es/es/ipublic/item/10308944
Identificador DOI: 10.23919/eusipco55093.2022.9909766
URL Oficial: https://eurasip.org/Proceedings/Eusipco/Eusipco202...
Depositado por: iMarina Portal Científico
Depositado el: 24 Ene 2025 09:41
Ultima Modificación: 24 Ene 2025 09:41