Skip to main content

High-Level Simulation of Embedded Software Vulnerabilities to EM Side-Channel Attacks

  • Conference paper
  • First Online:
Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13511))

Included in the following conference series:

  • 1518 Accesses

Abstract

Attacks on embedded devices using the electromagnetic (EM) side channel have proliferated. Predicting software vulnerability to such attacks requires an ability to simulate EM fields during software development rather than relying on expensive lab-based measurements. We propose a modeling approach capable of synthesizing instruction-level EM traces for arbitrary software, using a one-time pre-characterization of a processor. Reducing the cost of dictionary construction is a major contribution of this paper. Results on a set of benchmarks show that synthesized traces are accurate in estimating EM emanations with less than 5% mean absolute percentage error (MAPE) compared to measurements. Furthermore, synthesized traces predict control flow leakage with an accuracy of 87% or more based on the side-channel vulnerability factor (SVF) metric.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Arsath, K.F.M., Ganesan, V., Bodduna, R., Rebeiro, C.: PARAM: a microprocessor hardened for power side-channel attack resistance. In: HOST (2020)

    Google Scholar 

  2. Dalton-Project: Benchmark Applications for Synthesizeable VHDL Model, University of California Riverside. http://www.ann.ece.ufl.edu/i8051/i8051benchmarks/index.html

  3. Demme, J., Martin, R., Waksman, A., Sethumadhavan, S.: Side-channel vulnerability factor: a metric for measuring information leakage. In: ISCA (2012)

    Google Scholar 

  4. Genkin, D., Pachmanov, L., Pipman, I., Tromer, E.: ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs. In: CT-RSA (2016)

    Google Scholar 

  5. Getz, R., Moeckel, B.: Understanding and eliminating EMI in microcontroller applications (1996)

    Google Scholar 

  6. Han, Y., Etigowni, S., Liu, H., Zonouz, S., Petropulu, A.: Watch me, but don’t touch me! contactless control flow monitoring via electromagnetic emanations. In: CCCS (2017)

    Google Scholar 

  7. Iyer, V.V., Yilmaz, A.E.: Using the ANOVA F-statistic to isolate information-revealing near-field measurement configurations for embedded systems. In: EMC+SIPI (2021)

    Google Scholar 

  8. Kumar, A., Scarborough, C., Yilmaz, A., Orshansky, M.: Efficient simulation of EM side-channel attack resilience. In: ICCAD (2017)

    Google Scholar 

  9. Li, H., Markettos, A., Moore, S.: Security evaluation against electromagnetic analysis at design time. In: HLDVT (2005)

    Google Scholar 

  10. McCann, D., Oswald, E., Whitnall, C.: Towards practical tools for side channel aware software engineering: ‘Grey Box’ modelling for instruction leakages. In: USENIX Security (2017)

    Google Scholar 

  11. Menichelli, F., Menicocci, R., Olivieri, M., Trifiletti, A.: High-level side-channel attack modeling and simulation for security-critical systems on chips. IEEE TDSC 5(3), 164–176 (2008)

    Google Scholar 

  12. Robnik-Sikonja, M., Kononenko, I.: An adaptation of relief for attribute estimation in regression. In: ICML (1997)

    Google Scholar 

  13. Thuillet, C., Andouard, P., Ly, O.: A smart card power analysis simulator. In: CSE (2009)

    Google Scholar 

  14. Urbanowicz, R.J., Meeker, M., La Cava, W., Olson, R.S., Moore, J.H.: Relief-based feature selection: introduction and review. J. Biomed. Inf. 85, 189–203 (2018)

    Article  Google Scholar 

  15. Veshchikov, N.: SILK: high level of abstraction leakage simulator for side channel analysis. In: PPREW (2014)

    Google Scholar 

  16. Yoshikawa, M., Asai, T.: Platform for verification of electromagnetic analysis attacks against cryptographic circuits. In: ITNG (2013)

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by NSF grant CCF-1901446.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aditya Thimmaiah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thimmaiah, A., Iyer, V.V., Gerstlauer, A., Orshansky, M. (2022). High-Level Simulation of Embedded Software Vulnerabilities to EM Side-Channel Attacks. In: Orailoglu, A., Reichenbach, M., Jung, M. (eds) Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2022. Lecture Notes in Computer Science, vol 13511. Springer, Cham. https://doi.org/10.1007/978-3-031-15074-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-15074-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-15073-9

  • Online ISBN: 978-3-031-15074-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics