Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks

02/23/2021
by   Thilo Krachenfels, et al.
0

The security of modern electronic devices relies on secret keys stored on secure hardware modules as the root-of-trust (RoT). Extracting those keys would break the security of the entire system. As shown before, sophisticated side-channel analysis (SCA) attacks, using chip failure analysis (FA) techniques, can extract data from on-chip memory cells. However, since the chip's layout is unknown to the adversary in practice, secret key localization and reverse engineering are onerous tasks. Consequently, hardware vendors commonly believe that the ever-growing physical complexity of the integrated circuit (IC) designs can be a natural barrier against potential adversaries. In this work, we present a novel approach that can extract the secret key without any knowledge of the IC's layout, and independent from the employed memory technology as key storage. We automate the – traditionally very labor-intensive – reverse engineering and data extraction process. To that end, we demonstrate that black-box measurements captured using laser-assisted SCA techniques from a training device with known key can be used to profile the device for a later key prediction on other victim devices with unknown keys. To showcase the potential of our approach, we target keys on three different hardware platforms, which are utilized as RoT in different products.

READ FULL TEXT

page 7

page 8

page 9

page 11

page 12

page 13

page 18

research
09/16/2019

TAAL: Tampering Attack on Any Key-based Logic Locked Circuits

Due to the globalization of semiconductor manufacturing and test process...
research
06/11/2020

Evaluation of Low-Cost Thermal Laser Stimulation for Data Extraction and Key Readout

Recent attacks using thermal laser stimulation (TLS) have shown that it ...
research
09/12/2022

SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump

Digital forensics is the process of extracting, preserving, and document...
research
09/09/2020

Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model

Due to its sound theoretical basis and practical efficiency, masking has...
research
08/04/2022

Beware of Discarding Used SRAMs: Information is Stored Permanently

Data recovery has long been a focus of the electronics industry for deca...
research
07/28/2019

A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices

This paper provides a proof of concept for using SRAM based Physically U...
research
11/04/2017

Secure Communications using Nonlinear Silicon Photonic Keys

We present a secure communication system constructed using pairs of nonl...

Please sign up or login with your details

Forgot password? Click here to reset