Power-Based Side-Channel Attack for AES Key Extraction on the ATMega328 Microcontroller

03/13/2022
by   Utsav Banerjee, et al.
0

We demonstrate the extraction of an AES secret key from flash memory on the ATMega328 microcontroller (the microcontroller used on the popular Arduino Genuino/Uno board). We loaded a standard AVR-architecture AES-128 implementation onto the chip and encrypted randomly chosen plaintexts with several different keys. We measured the chip's power consumption during encryption, correlated observed power consumption with the expected power consumption of the plaintexts with every possible key, and ultimately extracted the 128-bit key used during AES. We describe here our test infrastructure for automated power trace collection, an overview of our correlation attack, sanitization of the traces and stumbling blocks encountered during data collection and analysis, and results of our attack.

READ FULL TEXT
research
06/28/2023

The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems

Power analysis is a class of side-channel attacks, where power consumpti...
research
03/11/2023

SHIELD: An Adaptive and Lightweight Defense against the Remote Power Side-Channel Attacks on Multi-tenant FPGAs

Dynamic partial reconfiguration enables multi-tenancy in cloud-based FPG...
research
07/10/2020

Microarchitecture Online Template Attacks

Online template attack (OTA) is a powerful technique previously used to ...
research
05/10/2022

Design and Implementation of a Secure RISC-V Microprocessor

Secret keys can be extracted from the power consumption or electromagnet...
research
01/03/2018

Power Analysis Based Side Channel Attack

Power analysis is a branch of side channel attacks where power consumpti...
research
11/20/2019

PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance

The power consumption of a microprocessor is a huge channel for informat...
research
07/27/2022

Balanced Encoding of Near-Zero Correlation for an AES Implementation

Power consumption of a circuit can be exploited to recover the secret ke...

Please sign up or login with your details

Forgot password? Click here to reset