Attacking at non-harmonic frequencies in screaming-channel attacks - Institut d'Electronique et de Télécommunications de Rennes Accéder directement au contenu
Communication Dans Un Congrès Année : 2023

Attacking at non-harmonic frequencies in screaming-channel attacks

Résumé

Screaming-channel attacks enable Electromagnetic (EM) Side-Channel Attacks (SCAs) at larger distances due to higher EM leakage energies than traditional SCAs, relaxing the requirement of close access to the victim. This attack can be mounted on devices integrating Radio Frequency (RF) modules on the same die as digital circuits, where the RF can unintentionally capture, modulate, amplify, and transmit the leakage along with legitimate signals. Leakage results from digital switching activity, so the hypothesis of previous works was that this leakage would appear at multiples of the digital clock frequency, i.e., harmonics. This work demonstrates that compromising signals appear not only at the harmonics and that leakage at non-harmonics can be exploited for successful attacks. Indeed, the transformations undergone by the leaked signal are complex due to propagation effects through the substrate and power and ground planes, so the leakage also appears at other frequencies. We first propose two methodologies to locate frequencies that contain leakage and demonstrate that it appears at non-harmonic frequencies. Then, our experimental results show that screaming-channel attacks at non-harmonic frequencies can be as successful as at harmonics when retrieving a 16-byte AES key. As the RF spectrum is polluted by interfering signals, we run experiments and show successful attacks in a more realistic, noisy environment where harmonic frequencies are contaminated by multi-path fading and interference. These attacks at non-harmonic frequencies increase the attack surface by providing attackers with an increased number of potential frequencies where attacks can succeed.
Fichier sous embargo
Fichier sous embargo
0 1 0
Année Mois Jours
Avant la publication
lundi 27 mai 2024
Fichier sous embargo
lundi 27 mai 2024
Connectez-vous pour demander l'accès au fichier

Dates et versions

hal-04309083 , version 1 (27-11-2023)
hal-04309083 , version 2 (30-11-2023)

Licence

Paternité - Pas d'utilisation commerciale - Pas de modification

Identifiants

  • HAL Id : hal-04309083 , version 2

Citer

Jeremy Guillaume, Maxime Pelcat, Amor Nafkha, Ruben Salvador. Attacking at non-harmonic frequencies in screaming-channel attacks. 22nd Smart Card Research and Advanced Application Conference (CARDIS 2023), Nov 2023, Amsterdam, Netherlands. pp.1--20. ⟨hal-04309083v2⟩
108 Consultations
35 Téléchargements

Partager

Gmail Facebook X LinkedIn More