A Practical Methodology for ML-Based EM Side Channel Disassemblers

06/21/2022
by   Cesar N. Arguello, et al.
0

Providing security guarantees for embedded devices with limited interface capabilities is an increasingly crucial task. Although these devices don't have traditional interfaces, they still generate unintentional electromagnetic signals that correlate with the instructions being executed. By collecting these traces using our methodology and leveraging a random forest algorithm to develop a machine learning model, we built an EM side channel based instruction level disassembler. The disassembler was tested on an Arduino UNO board, yielding an accuracy of 88.69 instructions captured at a single location in the device; this is an improvement compared to the 75.6 previous similar work.

READ FULL TEXT
research
02/05/2023

Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting

Embedded devices are omnipresent in modern networks including the ones o...
research
11/12/2020

EM-X-DL: Efficient Cross-Device Deep Learning Side-Channel Attack with Noisy EM Signatures

This work presents a Cross-device Deep-Learning based Electromagnetic (E...
research
07/23/2021

Mitigating Power Attacks through Fine-Grained Instruction Reordering

Side-channel attacks are a security exploit that take advantage of infor...
research
08/25/2019

SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing

Electromagnetic (EM) side-channel analysis (SCA) is a prominent tool to ...
research
07/25/2022

A Dataset Generation Framework for profiling Disassembly attacks using Side-Channel Leakages and Deep Neural Networks

Various studies among side-channel attacks have tried to extract informa...
research
07/02/2020

A Machine Learning Pipeline Stage for Adaptive Frequency Adjustment

A machine learning (ML) design framework is proposed for adaptively adju...
research
07/09/2019

Application Inference using Machine Learning based Side Channel Analysis

The proliferation of ubiquitous computing requires energy-efficient as w...

Please sign up or login with your details

Forgot password? Click here to reset