Virtual Triggering: a Technique to Segment Cryptographic Processes in Side Channel Traces

10/21/2022
by   Jeremy Guillaume, et al.
0

Side-Channel Attacks (SCAs) exploit data correla-tion in signals leaked from devices to jeopardize confidentiality. Locating and synchronizing segments of interest in traces from Cryptographic Processes (CPs) is a key step of the attack. The most common method consists in generating a trigger signal to indicate to the attacker the start of a CP. This paper proposes a method called Virtual Triggering (VT) that removes the need for the trigger signal and automates trace segmentation. When the time between repetitions is not constant, further trace alignment techniques are required. Building on VT, we propose a simple method to learn representative segment templates from a profiling device similar to the victim, and to automatically locate and pull out these segments from other victim devices using simple pattern recognition. We evaluate VT on screaming channel attacks [1], which initially used a Frequency Component (FC) known to appear at a single time in leaked signals, as a trigger to segment traces. We demonstrate that VT not only performs equivalently to FC on a standard attack scenario, but we also show how using VT with the automatic pullout technique improves the attack efficiency and enables more realistic attack scenarios. Thanks to VT, screaming channel attacks can now: (1) succeed with only half of the segments collected compared to the FC trigger from the original attack; and (2) absorb time variations between CPs.

READ FULL TEXT

page 3

page 4

page 5

page 6

research
04/23/2020

Encoding Power Traces as Images for Efficient Side-Channel Analysis

Side-Channel Attacks (SCAs) are a powerful method to attack implementati...
research
07/10/2020

Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks

Recently, many profiling side-channel attacks based on Machine Learning ...
research
07/25/2022

A Dataset Generation Framework for profiling Disassembly attacks using Side-Channel Leakages and Deep Neural Networks

Various studies among side-channel attacks have tried to extract informa...
research
01/03/2018

Power Analysis Based Side Channel Attack

Power analysis is a branch of side channel attacks where power consumpti...
research
08/25/2019

SCNIFFER: Low-Cost, Automated, Efficient Electromagnetic Side-Channel Sniffing

Electromagnetic (EM) side-channel analysis (SCA) is a prominent tool to ...
research
09/18/2023

Realistic Website Fingerprinting By Augmenting Network Trace

Website Fingerprinting (WF) is considered a major threat to the anonymit...
research
07/10/2020

Microarchitecture Online Template Attacks

Online template attack (OTA) is a powerful technique previously used to ...

Please sign up or login with your details

Forgot password? Click here to reset