skip to main content
10.1145/3465481.3465773acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

SoK: Remote Power Analysis

Published: 17 August 2021 Publication History

Abstract

In recent years, numerous attacks have appeared that aim to steal secret information from their victim using the power side-channel vector, yet without direct physical access. These attacks are called Remote Power Attacks or Remote Power Analysis, utilizing resources that are natively present inside the victim environment. However, there is no unified definition about the limitations that a power attack requires to be defined as remote. This paper aims to propose a unified definition and concrete threat models to clearly differentiate remote power attacks from non-remote ones. Additionally, we collect the main remote power attacks performed so far from the literature, and the principal proposed countermeasures to avoid them. The search of such countermeasures denoted a clear gap in preventing remote power attacks at the technical level. Thus, the academic community must face an important challenge to avoid this emerging threat, given the clear room for improvement that should be addressed in terms of defense and security of devices that work with private information.

References

[1]
Onur Acıiçmez, Billy Bob Brumley, and Philipp Grabher. 2010. New Results on Instruction Cache Attacks. In Cryptographic Hardware and Embedded Systems, CHES 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings(Lecture Notes in Computer Science, Vol. 6225), Stefan Mangard and François-Xavier Standaert (Eds.). Springer, 110–124. https://doi.org/10.1007/978-3-642-15031-9_8
[2]
Onur Acıiçmez, Shay Gueron, and Jean-Pierre Seifert. 2007. New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. In Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings(Lecture Notes in Computer Science, Vol. 4887), Steven D. Galbraith (Ed.). Springer, 185–203. https://doi.org/10.1007/978-3-540-77272-9_12
[3]
Onur Acıiçmez, Çetin Kaya Koç, and Jean-Pierre Seifert. 2007. On the Power of Simple Branch Prediction Analysis. In Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, AsiaCCS 2007, Singapore, March 20-22, 2007, Feng Bao and Steven Miller (Eds.). ACM, 312–320. https://doi.org/10.1145/1229285.1266999
[4]
Onur Acıiçmez, Çetin Kaya Koç, and Jean-Pierre Seifert. 2007. Predicting Secret Keys Via Branch Prediction. In Topics in Cryptology - CT-RSA 2007, The Cryptographers’ Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings(Lecture Notes in Computer Science, Vol. 4377), Masayuki Abe (Ed.). Springer, 225–242. https://doi.org/10.1007/11967668_15
[5]
Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, and Pankaj Rohatgi. 2002. The EM Side-Channel(s). In Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers(Lecture Notes in Computer Science, Vol. 2523), Burton S. Kaliski Jr., Çetin Kaya Koç, and Christof Paar (Eds.). Springer, 29–45. https://doi.org/10.1007/3-540-36400-5_4
[6]
Alejandro Cabrera Aldaya, Billy Bob Brumley, Sohaib ul Hassan, Cesar Pereida García, and Nicola Tuveri. 2019. Port Contention for Fun and Profit. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019. IEEE, 870–887. https://doi.org/10.1109/SP.2019.00066
[7]
Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, and Justine Wild. 2013. Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations. In Topics in Cryptology - CT-RSA 2013 - The Cryptographers’ Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings(Lecture Notes in Computer Science, Vol. 7779), Ed Dawson(Ed.). Springer, 1–17. https://doi.org/10.1007/978-3-642-36095-4_1
[8]
Daniel J. Bernstein. 2005. Cache-timing attacks on AES. http://cr.yp.to/papers.html#cachetiming
[9]
Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, and Anil Kurmus. 2019. SMoTherSpectre: Exploiting Speculative Execution through Port Contention. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz (Eds.). ACM, 785–800. https://doi.org/10.1145/3319535.3363194
[10]
Eric Brier, Christophe Clavier, and Francis Olivier. 2004. Correlation Power Analysis with a Leakage Model. In Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings(Lecture Notes in Computer Science, Vol. 3156), Marc Joye and Jean-Jacques Quisquater (Eds.). Springer, 16–29. https://doi.org/10.1007/978-3-540-28632-5_2
[11]
David Brumley and Dan Boneh. 2003. Remote Timing Attacks Are Practical. In Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003. USENIX Association. https://www.usenix.org/conference/12th-usenix-security-symposium/remote-timing-attacks-are-practical
[12]
Giovanni Camurati, Aurélien Francillon, and François-Xavier Standaert. 2020. Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020, 3 (2020), 358–401. https://doi.org/10.13154/tches.v2020.i3.358-401
[13]
Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, and Aurélien Francillon. 2018. Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM, 163–177. https://doi.org/10.1145/3243734.3243802
[14]
Thomas De Cnudde and Svetla Nikova. 2017. Securing the PRESENT Block Cipher Against Combined Side-Channel Analysis and Fault Attacks. IEEE Trans. Very Large Scale Integr. Syst. 25, 12 (2017), 3291–3301. https://doi.org/10.1109/TVLSI.2017.2713483
[15]
Jean-Sébastien Coron. 1999. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In Cryptographic Hardware and Embedded Systems, First International Workshop, CHES’99, Worcester, MA, USA, August 12-13, 1999, Proceedings(Lecture Notes in Computer Science, Vol. 1717), Çetin Kaya Koç and Christof Paar (Eds.). Springer, 292–302. https://doi.org/10.1007/3-540-48059-5_25
[16]
Ignacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Bob Brumley, and Antonis Michalas. 2021. Attestation Waves: Platform Trust via Remote Power Analysis. CoRR abs/2105.02435(2021). arxiv:2105.02435https://arxiv.org/abs/2105.02435
[17]
Karine Gandolfi, Christophe Mourtel, and Francis Olivier. 2001. Electromagnetic Analysis: Concrete Results. In Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings(Lecture Notes in Computer Science, Vol. 2162), Çetin Kaya Koç, David Naccache, and Christof Paar(Eds.). Springer, 251–261. https://doi.org/10.1007/3-540-44709-1_21
[18]
Catherine H. Gebotys. 2006. A table masking countermeasure for low-energy secure embedded systems. IEEE Trans. Very Large Scale Integr. Syst. 14, 7 (2006), 740–753. https://doi.org/10.1109/TVLSI.2006.878344
[19]
Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer. 2015. Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. In Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings(Lecture Notes in Computer Science, Vol. 9293), Tim Güneysu and Helena Handschuh (Eds.). Springer, 207–228. https://doi.org/10.1007/978-3-662-48324-4_11
[20]
Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer. 2016. ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. In Topics in Cryptology - CT-RSA 2016 - The Cryptographers’ Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings(Lecture Notes in Computer Science, Vol. 9610), Kazue Sako (Ed.). Springer, 219–235. https://doi.org/10.1007/978-3-319-29485-8_13
[21]
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, and Yuval Yarom. 2016. ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, and Shai Halevi (Eds.). ACM, 1626–1638. https://doi.org/10.1145/2976749.2978353
[22]
Daniel Genkin, Mihir Pattani, Roei Schuster, and Eran Tromer. 2019. Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019. IEEE, 853–869. https://doi.org/10.1109/SP.2019.00074
[23]
Daniel Genkin, Adi Shamir, and Eran Tromer. 2014. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I(Lecture Notes in Computer Science, Vol. 8616), Juan A. Garay and Rosario Gennaro (Eds.). Springer, 444–461. https://doi.org/10.1007/978-3-662-44371-2_25
[24]
Dennis R. E. Gnad, Jonas Krautter, and Mehdi Baradaran Tahoori. 2019. Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019, 3 (2019), 305–339. https://doi.org/10.13154/tches.v2019.i3.305-339
[25]
Dennis R. E. Gnad, Jonas Krautter, Mehdi Baradaran Tahoori, Falk Schellenberg, and Amir Moradi. 2020. Remote Electrical-level Security Threats to Multi-Tenant FPGAs. IEEE Des. Test 37, 2 (2020), 111–119. https://doi.org/10.1109/MDAT.2020.2968248
[26]
Gabriel Goller and Georg Sigl. 2015. Side Channel Attacks on Smartphones and Embedded Devices Using Standard Radio Equipment. In Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers(Lecture Notes in Computer Science, Vol. 9064), Stefan Mangard and Axel Y. Poschmann (Eds.). Springer, 255–270. https://doi.org/10.1007/978-3-319-21476-4_17
[27]
Gilbert Goodwill, Benjamin Jun, Josh Jaffe, and Pankaj Rohatgi. 2011. A testing methodology for side-channel resistance validation. In Non-Invasive Attack Testing Workshop, NIAT 2011, Nara, Japan, September 26-27, 2011. Proceedings. NIST. https://csrc.nist.gov/csrc/media/events/non-invasive-attack-testing-workshop/documents/08_goodwill.pdf
[28]
Louis Goubin. 2003. A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. In Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings(Lecture Notes in Computer Science, Vol. 2567), Yvo Desmedt (Ed.). Springer, 199–210. https://doi.org/10.1007/3-540-36288-6_15
[29]
Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, and Philippe Loubet-Moundi. 2019. High-Speed Ring Oscillator based Sensors for Remote Side-Channel Attacks on FPGAs. In 2019 International Conference on ReConFigurable Computing and FPGAs, ReConFig 2019, Cancun, Mexico, December 9-11, 2019, David Andrews, René Cumplido, Claudia Feregrino, and Marco Platzner (Eds.). IEEE, 1–8. https://doi.org/10.1109/ReConFig48160.2019.8994789
[30]
Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, Philippe Loubet-Moundi, and Francis Olivier. 2019. Remote Side-Channel Attacks on Heterogeneous SoC. In Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers(Lecture Notes in Computer Science, Vol. 11833), Sonia Belaïd and Tim Güneysu (Eds.). Springer, 109–125. https://doi.org/10.1007/978-3-030-42068-0_7
[31]
Joseph Gravellier, Jean-Max Dutertre, Yannick Teglia, and Philippe Loubet Moundi. 2020. SideLine: How Delay-Lines (May) Leak Secrets from your SoC. arxiv:2009.07773 [cs.CR] https://arxiv.org/abs/2009.07773
[32]
Daniel Gruss, Clémentine Maurice, Klaus Wagner, and Stefan Mangard. 2016. Flush+Flush: A Fast and Stealthy Cache Attack. In Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings(Lecture Notes in Computer Science, Vol. 9721), Juan Caballero, Urko Zurutuza, and Ricardo J. Rodríguez (Eds.). Springer, 279–299. https://doi.org/10.1007/978-3-319-40667-1_14
[33]
David Gullasch, Endre Bangerter, and Stephan Krenn. 2011. Cache Games - Bringing Access-Based Cache Attacks on AES to Practice. In 32nd IEEE Symposium on Security and Privacy, S&P 2011, 22-25 May 2011, Berkeley, California, USA. IEEE Computer Society, 490–505. https://doi.org/10.1109/SP.2011.22
[34]
Yu-Ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger. 2013. Analysis of Electromagnetic Information Leakage From Cryptographic Devices With Different Physical Structures. IEEE Transactions on Electromagnetic Compatibility 55, 3 (June 2013), 571–580. https://doi.org/10.1109/TEMC.2012.2227486
[35]
Yuval Ishai, Amit Sahai, and David A. Wagner. 2003. Private Circuits: Securing Hardware against Probing Attacks. In Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings(Lecture Notes in Computer Science, Vol. 2729), Dan Boneh(Ed.). Springer, 463–481. https://doi.org/10.1007/978-3-540-45146-4_27
[36]
Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, and Peter Langendörfer. 2020. Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. In 23rd Euromicro Conference on Digital System Design, DSD 2020, Kranj, Slovenia, August 26-28, 2020. IEEE, 270–276. https://doi.org/10.1109/DSD51259.2020.00051
[37]
Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, and Ahmad-Reza Sadeghi. 2020. V0LTpwn: Attacking x86 Processor Integrity from Software. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 1445–1461. https://www.usenix.org/conference/usenixsecurity20/presentation/kenjar
[38]
Yoongu Kim, Ross Daly, Jeremie S. Kim, Chris Fallin, Ji-Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. 2014. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors. In ACM/IEEE 41st International Symposium on Computer Architecture, ISCA 2014, Minneapolis, MN, USA, June 14-18, 2014. IEEE Computer Society, 361–372. https://doi.org/10.1109/ISCA.2014.6853210
[39]
Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019. IEEE, 1–19. https://doi.org/10.1109/SP.2019.00002
[40]
Paul C. Kocher. 1996. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology - CRYPTO ’96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings(Lecture Notes in Computer Science, Vol. 1109), Neal Koblitz (Ed.). Springer, 104–113. https://doi.org/10.1007/3-540-68697-5_9
[41]
Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings(Lecture Notes in Computer Science, Vol. 1666), Michael J. Wiener (Ed.). Springer, 388–397. https://doi.org/10.1007/3-540-48405-1_25
[42]
Jonas Krautter, Dennis R. E. Gnad, Falk Schellenberg, Amir Moradi, and Mehdi Baradaran Tahoori. 2019. Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs. In Proceedings of the International Conference on Computer-Aided Design, ICCAD 2019, Westminster, CO, USA, November 4-7, 2019, David Z. Pan (Ed.). ACM, 1–8. https://doi.org/10.1109/ICCAD45719.2019.8942094
[43]
Jonas Krautter, Dennis R. E. Gnad, and Mehdi Baradaran Tahoori. 2018. FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018, 3 (2018), 44–68. https://doi.org/10.13154/tches.v2018.i3.44-68
[44]
Noboru Kunihiro and Junya Honda. 2014. RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. In Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings(Lecture Notes in Computer Science, Vol. 8731), Lejla Batina and Matthew Robshaw (Eds.). Springer, 261–278. https://doi.org/10.1007/978-3-662-44709-3_15
[45]
JongHyeok Lee and Dong-Guk Han. 2020. Security analysis on dummy based side-channel countermeasures—Case study: AES with dummy and shuffling. Appl. Soft Comput. 93(2020), 106352. https://doi.org/10.1016/j.asoc.2020.106352
[46]
Itamar Levi, Alexander Fish, and Osnat Keren. 2017. CPA Secured Data-Dependent Delay-Assignment Methodology. IEEE Trans. Very Large Scale Integr. Syst. 25, 2 (2017), 608–620. https://doi.org/10.1109/TVLSI.2016.2592967
[47]
Moritz Lipp, Andreas Kogler, David Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, and Daniel Gruss. 2021. PLATYPUS: Software-based Power Side-Channel Attacks on x86. In 2021 IEEE Symposium on Security and Privacy, SP 2021, Virtual Event, USA, May 24-27, 2021. IEEE, 1080–1096. https://doi.org/10.1109/SP40001.2021.00063
[48]
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018, William Enck and Adrienne Porter Felt (Eds.). USENIX Association, 973–990. https://www.usenix.org/conference/usenixsecurity18/presentation/lipp
[49]
Owen Lo, William J. Buchanan, and Douglas Carson. 2017. Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology 1, 2 (April 2017), 88–107. https://doi.org/10.1080/23742917.2016.1231523
[50]
Stefan Mangard, Elisabeth Oswald, and Thomas Popp. 2007. Power analysis attacks - revealing the secrets of smart cards. Springer. https://doi.org/10.1007/978-0-387-38162-6
[51]
Rita Mayer-Sommer. 2000. Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards. In Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings(Lecture Notes in Computer Science, Vol. 1965), Çetin Kaya Koç and Christof Paar (Eds.). Springer, 78–92. https://doi.org/10.1007/3-540-44499-8_6
[52]
Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, and Gabi Nakibly. 2015. PowerSpy: Location Tracking Using Mobile Device Power Analysis. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 785–800. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/michalevsky
[53]
Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens. 2020. Plundervolt: Software-based Fault Injection Attacks against Intel SGX. In 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18-21, 2020. IEEE, 1466–1482. https://doi.org/10.1109/SP40000.2020.00057
[54]
Colin O’Flynn and Alex Dewar. 2019. On-Device Power Analysis Across Hardware Security Domains. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019, 4 (2019), 126–153. https://doi.org/10.13154/tches.v2019.i4.126-153
[55]
Dag Arne Osvik, Adi Shamir, and Eran Tromer. 2006. Cache Attacks and Countermeasures: The Case of AES. In Topics in Cryptology - CT-RSA 2006, The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings(Lecture Notes in Computer Science, Vol. 3860), David Pointcheval (Ed.). Springer, 1–20. https://doi.org/10.1007/11605805_1
[56]
Dan Page. 2002. Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. IACR Cryptology ePrint Archive 2002, 169 (2002). http://eprint.iacr.org/2002/169
[57]
Colin Percival. 2005. Cache Missing for Fun and Profit. In BSDCan 2005, Ottawa, Canada, May 13-14, 2005, Proceedings. http://www.daemonology.net/papers/cachemissing.pdf
[58]
Emmanuel Prouff. 2005. DPA Attacks and S-Boxes. In Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers(Lecture Notes in Computer Science, Vol. 3557), Henri Gilbert and Helena Handschuh (Eds.). Springer, 424–441. https://doi.org/10.1007/11502760_29
[59]
Pengfei Qiu, Dongsheng Wang, Yongqiang Lyu, and Gang Qu. 2019. VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, Lorenzo Cavallaro, Johannes Kinder, XiaoFeng Wang, and Jonathan Katz (Eds.). ACM, 195–209. https://doi.org/10.1145/3319535.3354201
[60]
Jean-Jacques Quisquater and David Samyde. 2001. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings(Lecture Notes in Computer Science, Vol. 2140), Isabelle Attali and Thomas P. Jensen (Eds.). Springer, 200–210. https://doi.org/10.1007/3-540-45418-7_17
[61]
Chethan Ramesh, Shivukumar B. Patil, Siva Nishok Dhanuskodi, George Provelengios, Sébastien Pillement, Daniel E. Holcomb, and Russell Tessier. 2018. FPGA Side Channel Attacks without Physical Access. In 26th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2018, Boulder, CO, USA, April 29 - May 1, 2018. IEEE Computer Society, 45–52. https://doi.org/10.1109/FCCM.2018.00016
[62]
Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, and Mehdi Baradaran Tahoori. 2018. An inside job: Remote power analysis attacks on FPGAs. In 2018 Design, Automation & Test in Europe Conference & Exhibition, DATE 2018, Dresden, Germany, March 19-23, 2018, Jan Madsen and Ayse K. Coskun (Eds.). IEEE, 1111–1116. https://doi.org/10.23919/DATE.2018.8342177
[63]
Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, and Mehdi Baradaran Tahoori. 2018. Remote inter-chip power analysis side-channel attacks at board-level. In Proceedings of the International Conference on Computer-Aided Design, ICCAD 2018, San Diego, CA, USA, November 05-08, 2018, Iris Bahar (Ed.). ACM, 114. https://doi.org/10.1145/3240765.3240841
[64]
Dillibabu Shanmugam, Ravikumar Selvam, and Suganya Annadurai. 2014. Differential Power Analysis Attack on SIMON and LED Block Ciphers. In Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings(Lecture Notes in Computer Science, Vol. 8804), Rajat Subhra Chakraborty, Vashek Matyas, and Patrick Schaumont(Eds.). Springer, 110–125. https://doi.org/10.1007/978-3-319-12060-7_8
[65]
Adrian Tang, Simha Sethumadhavan, and Salvatore J. Stolfo. 2017. CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017, Engin Kirda and Thomas Ristenpart (Eds.). USENIX Association, 1057–1074. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/tang
[66]
Kris Tiri and Ingrid Verbauwhede. 2004. A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation. In 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), 16-20 February 2004, Paris, France. IEEE Computer Society, 246–251. https://doi.org/10.1109/DATE.2004.1268856
[67]
Kris Tiri and Ingrid Verbauwhede. 2005. Design Method for Constant Power Consumption of Differential Logic Circuits. In 2005 Design, Automation and Test in Europe Conference and Exposition (DATE 2005), 7-11 March 2005, Munich, Germany. IEEE Computer Society, 628–633. https://doi.org/10.1109/DATE.2005.113
[68]
Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, and Hiroshi Miyauchi. 2003. Cryptanalysis of DES Implemented on Computers with Cache. In Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings(Lecture Notes in Computer Science, Vol. 2779), Colin D. Walter, Çetin Kaya Koç, and Christof Paar (Eds.). Springer, 62–76. https://doi.org/10.1007/978-3-540-45238-6_6
[69]
Wim van Eck. 1985. Electromagnetic radiation from video display units: An eavesdropping risk?Comput. Secur. 4, 4 (1985), 269–286. https://doi.org/10.1016/0167-4048(85)90046-X
[70]
Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014. USENIX Association, 719–732. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/yarom
[71]
Mark Zhao and G. Edward Suh. 2018. FPGA-Based Remote Power Side-Channel Attacks. In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA. IEEE Computer Society, 229–244. https://doi.org/10.1109/SP.2018.00049

Cited By

View all
  • (2025)Multi-Tenant Cloud FPGA: A Survey on Security, Trust and PrivacyACM Transactions on Reconfigurable Technology and Systems10.1145/3713078Online publication date: 27-Jan-2025
  • (2024)PARADISE: Criticality-Aware Instruction Reordering for Power Attack ResistanceACM Transactions on Architecture and Code Optimization10.1145/3701991Online publication date: 29-Oct-2024
  • (2024)Remote side-channel analysis of the loop PUF using a TDC-based voltage sensorJournal of Cryptographic Engineering10.1007/s13389-024-00366-015:1Online publication date: 14-Nov-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
August 2021
1447 pages
ISBN:9781450390514
DOI:10.1145/3465481
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. applied cryptography
  2. countermeasures
  3. hardware security
  4. power analysis
  5. remote power analysis
  6. side-channel analysis

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ARES 2021

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)68
  • Downloads (Last 6 weeks)5
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Multi-Tenant Cloud FPGA: A Survey on Security, Trust and PrivacyACM Transactions on Reconfigurable Technology and Systems10.1145/3713078Online publication date: 27-Jan-2025
  • (2024)PARADISE: Criticality-Aware Instruction Reordering for Power Attack ResistanceACM Transactions on Architecture and Code Optimization10.1145/3701991Online publication date: 29-Oct-2024
  • (2024)Remote side-channel analysis of the loop PUF using a TDC-based voltage sensorJournal of Cryptographic Engineering10.1007/s13389-024-00366-015:1Online publication date: 14-Nov-2024
  • (2024)Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick DivergencesAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68391-6_14(461-491)Online publication date: 18-Aug-2024
  • (2023)A Survey on FPGA Cybersecurity Design StrategiesACM Transactions on Reconfigurable Technology and Systems10.1145/356151516:2(1-33)Online publication date: 11-Mar-2023
  • (2023)FPGA Bitstream Modification: Attacks and CountermeasuresIEEE Access10.1109/ACCESS.2023.333150711(127931-127955)Online publication date: 2023
  • (2022)Power profiling-based side-channel attacks on FPGA and Countermeasures: A survey2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)10.1109/ICoDT255437.2022.9787473(1-8)Online publication date: 24-May-2022
  • (2021)Attestation Waves: Platform Trust via Remote Power AnalysisCryptology and Network Security10.1007/978-3-030-92548-2_24(460-482)Online publication date: 13-Dec-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media