Texto completo
|
PDF (Portable Document Format)
- Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB) |
ORCID: https://orcid.org/0000-0002-5261-5491, Pérez Tirador, Pablo
ORCID: https://orcid.org/0000-0002-8912-3423, Cabezaolias López, Carmen
ORCID: https://orcid.org/0009-0008-7488-1548, Carnero, Pablo and Caffarena Fernández, Gabriel
ORCID: https://orcid.org/0000-0002-2902-3869
(2022).
Side-channel attack countermeasure based on power supply modulation.
En: "30th European Signal Processing Conference (EUSIPCO)", 29/08/2022-02/09/2022, Belgrado, Serbia. p. 5.
https://doi.org/10.23919/eusipco55093.2022.9909766.
| Título: | Side-channel attack countermeasure based on power supply modulation |
|---|---|
| Autor/es: |
|
| Tipo de Documento: | Ponencia en Congreso o Jornada (Artículo) |
| Título del Evento: | 30th European Signal Processing Conference (EUSIPCO) |
| Fechas del Evento: | 29/08/2022-02/09/2022 |
| Lugar del Evento: | Belgrado, Serbia |
| Título del Libro: | 30th European Signal Processing Conference (EUSIPCO) |
| Fecha: | 1 Septiembre 2022 |
| ISSN: | 20761465 |
| Materias: | |
| Palabras Clave Informales: | Performance evaluation; power supplies; microcontrollers; modulation; voltage; side-channel attacks; passwords |
| Escuela: | E.T.S.I. Telecomunicación (UPM) |
| Departamento: | Ingeniería Electrónica |
| Licencias Creative Commons: | Reconocimiento - Sin obra derivada - No comercial |
|
PDF (Portable Document Format)
- Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (1MB) |
As the number of IoT devices grows exponentially every year, so do the security threats. Due to their mobility and limited size, power and performance, these devices are particularly vulnerable to side-channel attacks that are based on device physical leaks. In this paper, we modulate the power supply voltage to secure the devices against two types of side-channel attacks: differential and correlation power analysis attacks (DPA and CPA) that aim to reveal cryptographic secret key and attacks that process the leaked signal to obtain the information on the activity inside the device (e.g. identify the keystrokes when typing a password). We perform both types of attacks on a low-cost microcontroller used in a variety of IoT devices and find the most effective voltage modulation for both of the targeted attacks. The proposed countermeasure is easy to implement and does not require re-designing the microcontroller, thereby avoiding high costs of fabrication and testing. It is extremely effective against cryptographic attacks as it increases the minimum number of traces required to disclose (MTD) by two orders of magnitude. For non-cryptographic attacks the correlation coefficient between the leaked signal and the sensitive information is lowered by 33%.
| ID de Registro: | 86785 |
|---|---|
| Identificador DC: | https://oa.upm.es/86785/ |
| Identificador OAI: | oai:oa.upm.es:86785 |
| URL Portal Científico: | https://portalcientifico.upm.es/es/ipublic/item/10308944 |
| Identificador DOI: | 10.23919/eusipco55093.2022.9909766 |
| URL Oficial: | https://eurasip.org/Proceedings/Eusipco/Eusipco202... |
| Depositado por: | iMarina Portal Científico |
| Depositado el: | 24 Ene 2025 09:41 |
| Ultima Modificación: | 24 Ene 2025 09:41 |
Publicar en el Archivo Digital desde el Portal Científico