Abstract
Attacks on embedded devices using the electromagnetic (EM) side channel have proliferated. Predicting software vulnerability to such attacks requires an ability to simulate EM fields during software development rather than relying on expensive lab-based measurements. We propose a modeling approach capable of synthesizing instruction-level EM traces for arbitrary software, using a one-time pre-characterization of a processor. Reducing the cost of dictionary construction is a major contribution of this paper. Results on a set of benchmarks show that synthesized traces are accurate in estimating EM emanations with less than 5% mean absolute percentage error (MAPE) compared to measurements. Furthermore, synthesized traces predict control flow leakage with an accuracy of 87% or more based on the side-channel vulnerability factor (SVF) metric.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arsath, K.F.M., Ganesan, V., Bodduna, R., Rebeiro, C.: PARAM: a microprocessor hardened for power side-channel attack resistance. In: HOST (2020)
Dalton-Project: Benchmark Applications for Synthesizeable VHDL Model, University of California Riverside. http://www.ann.ece.ufl.edu/i8051/i8051benchmarks/index.html
Demme, J., Martin, R., Waksman, A., Sethumadhavan, S.: Side-channel vulnerability factor: a metric for measuring information leakage. In: ISCA (2012)
Genkin, D., Pachmanov, L., Pipman, I., Tromer, E.: ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs. In: CT-RSA (2016)
Getz, R., Moeckel, B.: Understanding and eliminating EMI in microcontroller applications (1996)
Han, Y., Etigowni, S., Liu, H., Zonouz, S., Petropulu, A.: Watch me, but don’t touch me! contactless control flow monitoring via electromagnetic emanations. In: CCCS (2017)
Iyer, V.V., Yilmaz, A.E.: Using the ANOVA F-statistic to isolate information-revealing near-field measurement configurations for embedded systems. In: EMC+SIPI (2021)
Kumar, A., Scarborough, C., Yilmaz, A., Orshansky, M.: Efficient simulation of EM side-channel attack resilience. In: ICCAD (2017)
Li, H., Markettos, A., Moore, S.: Security evaluation against electromagnetic analysis at design time. In: HLDVT (2005)
McCann, D., Oswald, E., Whitnall, C.: Towards practical tools for side channel aware software engineering: ‘Grey Box’ modelling for instruction leakages. In: USENIX Security (2017)
Menichelli, F., Menicocci, R., Olivieri, M., Trifiletti, A.: High-level side-channel attack modeling and simulation for security-critical systems on chips. IEEE TDSC 5(3), 164–176 (2008)
Robnik-Sikonja, M., Kononenko, I.: An adaptation of relief for attribute estimation in regression. In: ICML (1997)
Thuillet, C., Andouard, P., Ly, O.: A smart card power analysis simulator. In: CSE (2009)
Urbanowicz, R.J., Meeker, M., La Cava, W., Olson, R.S., Moore, J.H.: Relief-based feature selection: introduction and review. J. Biomed. Inf. 85, 189–203 (2018)
Veshchikov, N.: SILK: high level of abstraction leakage simulator for side channel analysis. In: PPREW (2014)
Yoshikawa, M., Asai, T.: Platform for verification of electromagnetic analysis attacks against cryptographic circuits. In: ITNG (2013)
Acknowledgments
This work was supported in part by NSF grant CCF-1901446.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Thimmaiah, A., Iyer, V.V., Gerstlauer, A., Orshansky, M. (2022). High-Level Simulation of Embedded Software Vulnerabilities to EM Side-Channel Attacks. In: Orailoglu, A., Reichenbach, M., Jung, M. (eds) Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2022. Lecture Notes in Computer Science, vol 13511. Springer, Cham. https://doi.org/10.1007/978-3-031-15074-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-15074-6_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-15073-9
Online ISBN: 978-3-031-15074-6
eBook Packages: Computer ScienceComputer Science (R0)