Attestation Waves: Platform Trust via Remote Power Analysis

Attestation is a strong tool to verify the integrity of an untrusted system. However, in recent years, different attacks have appeared that are able to mislead the attestation process with treacherous practices as memory copy, proxy and rootkit attacks, just to name a few. A successful attack leads to systems that are considered trusted by a verifier system, while the prover has bypassed the challenge. To harden these attacks against attestation methods and protocols, some proposals have considered the use of side-channel information that can be measured externally, as it is the case of electromagnetic (EM) emanation. Nonetheless, these methods require the physical proximity of an external setup to capture the EM radiation. In this paper, we present the possibility of performing attestation by using the side channel information captured by a sensor or peripheral that lives in the same System-on-Chip (SoC) than the processor system (PS) which executes the operation that we aim to attest, by only sharing the Power Distribution Network (PDN). In our case, an analog-to-digital converter (ADC) that captures the voltage fluctuations at its input terminal while a certain operation is taking place is suitable to characterize itself and to distinguish it from other binaries. The resultant power traces are enough to clearly identify a given operation without the requirement of physical proximity.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/21/2021

Digital and Physical-World Attacks on Remote Pulse Detection

Remote photoplethysmography (rPPG) is a technique for estimating blood v...
research
02/25/2018

Blindsight: Blinding EM Side-Channel Leakage using Built-In Fully Integrated Inductive Voltage Regulator

Modern high-performance as well as power-constrained System-on-Chips (So...
research
09/06/2022

Side-channel attack analysis on in-memory computing architectures

In-memory computing (IMC) systems have great potential for accelerating ...
research
11/16/2021

Remote Memory-Deduplication Attacks

Memory utilization can be reduced by merging identical memory blocks int...
research
09/09/2022

Replay-based Recovery for Autonomous Robotic Vehicles from Sensor Deception Attacks

Sensors are crucial for autonomous operation in robotic vehicles (RV). P...
research
01/08/2022

Horizontal Attacks against ECC: from Simulations to ASIC

In this paper we analyse the impact of different compile options on the ...

Please sign up or login with your details

Forgot password? Click here to reset