Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis

12/24/2020
by   Unai Rioja, et al.
0

Due to the constant increase and versatility of IoT devices that should keep sensitive information private, Side-Channel Analysis (SCA) attacks on embedded devices are gaining visibility in the industrial field. The integration and validation of countermeasures against SCA can be an expensive and cumbersome process, especially for the less experienced ones, and current certification procedures require to attack the devices under test using multiple SCA techniques and attack vectors, often implying a high degree of complexity. The goal of this paper is to ease one of the most crucial and tedious steps of profiling attacks i.e. the points of interest (POI) selection and hence assist the SCA evaluation process. To this end, we introduce the usage of Estimation of Distribution Algorithms (EDAs) in the SCA field in order to automatically tune the point of interest selection. We showcase our approach on several experimental use cases, including attacks on unprotected and protected AES implementations over distinct copies of the same device, dismissing in this way the portability issue.

READ FULL TEXT
research
03/18/2019

A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics

The increasing prevalence of Internet of Things (IoT) devices has made i...
research
10/04/2018

Shakedown: compiler-based moving target protection for Return Oriented Programing attacks on an industrial IoT device

Cybercriminals use Return Oriented Programming techniques to attack syst...
research
03/01/2022

Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review

Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks ...
research
06/23/2020

The uncertainty of Side-Channel Analysis: A way to leverage from heuristics

Performing a comprehensive side-channel analysis evaluation of small emb...
research
01/31/2020

Battery draining attacks against edge computing nodes in IoT networks

Many IoT devices, especially those deployed at the network edge have lim...
research
05/08/2022

FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

Channel hopping provides a defense mechanism against jamming attacks in ...
research
08/11/2023

CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation

The expansion of the Internet-of-Things (IoT) paradigm is inevitable, bu...

Please sign up or login with your details

Forgot password? Click here to reset