Title :
Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios
Author :
Montminy, David P. ; Baldwin, Rusty O. ; Temple, Michael A. ; Oxley, Mark E.
Author_Institution :
Department of Electrical and Computer Engineering, U.S. Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
Abstract :
Side-channel analysis has been used to successfully attack many cryptographic systems. However, to improve trace quality and make collection of side-channel data easier, the attacker typically modifies the target device to add a trigger signal. This trigger implies a very powerful attacker with virtually complete control over the device. This paper describes a method to collect side-channel data using a software defined radio (SDR) in real-time without requiring a collection device trigger. A correlation-based frequency-dependent leakage mapping technique is introduced to evaluate a 32-bit microprocessor, revealing that individual key bytes leak at different frequencies. Key byte-dependent leakage is observed in both SDR collected and triggered oscilloscope-based collections (which serve to validate the SDR data). This research is the first to demonstrate effective differential attack using SDRs. Successful attacks are presented using two SDRs, including a US$20 digital television receiver with modified drivers.
Keywords :
Bandwidth; Correlation; Encryption; Oscilloscopes; Software radio; Side-channel analysis; differential attack; frequency mapping; information leakage; software defined radio; sub-Nyquist;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2013.2287600