A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics
@article{Sayakkara2019ASO, title={A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics}, author={Asanka P. Sayakkara and Nhien-An Le-Khac and M. Scanlon}, journal={Digit. Investig.}, year={2019}, volume={29}, pages={43-54} }
46 Citations
Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework
- Computer ScienceDigit. Investig.
- 2020
Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets
- Computer ScienceIEEE Access
- 2021
A comprehensive EM side-channel dataset representing a diverse collection of popular IoT devices and smartphones is presented to demonstrate the potential usage of machine learning models to recognise device behaviour.
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis
- Computer ScienceDigit. Investig.
- 2020
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices
- Computer ScienceDigit. Investig.
- 2019
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks
- Computer ScienceSymmetry
- 2020
This work provides a comprehensive, vis-Ã -vis comparison of the security aspects of the thus far most widespread IoT Wireless Personal Area Network (WPAN) protocols, namely BLE, Z-Wave, ZigBee, Thread, and EnOcean.
Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT
- Computer Science, MathematicsComputer Science & Information Technology (CS & IT)
- 2021
A summary of the related literature (IoT, lightweight cryptography, side-channel attacks and EMA), the methodology, current outcomes and future plans for the optimised results are provided.
Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher
- Computer Science, Mathematics2022 6th International Conference on Cryptography, Security and Privacy (CSP)
- 2022
This work aims to determine the probability of secret key leakage with a minimum number of electromagnetic (EM) waveforms possible, and presents the methodology in attack modelling, current results that indicate a probability of leaking seven bytes of the key and upcoming plans for optimisation.
Electromagnetic Fields as a Sign of Side-Channel Attacks in GSM Module
- Computer Science2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
- 2021
An overview of various methods of detecting unauthorized access in mobile communication devices is offered, as a result of which it becomes possible to automate the analysis and determine the legitimacy of the radio transmitting modules.
ULTRA-LIGHTWEIGHT CIPHER: PRESENT
- Computer Science, Mathematics
- 2021
A summary of the related literature (IoT, lightweight cryptography, side-channel attacks and EMA), the methodology, current outcomes and future plans for the optimised results are provided.
A Secure and Anonymous Communicate Scheme over the Internet of Things
- Computer ScienceACM Trans. Sens. Networks
- 2022
The authors design a lightweight communication scheme for the remote-control system in this work, using two kinds of Virtual-Spaces to achieve the purpose of identity announced and data exchanged and believe that the scheme is practical and is suitable for scenarios that are not time-sensitive but require high anonymity.
References
SHOWING 1-10 OF 140 REFERENCES
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
- Computer Science, MathematicsIEEE Communications Surveys & Tutorials
- 2018
This paper proposes a new categorization system for side-channel attacks, necessary as side- channel attacks have evolved significantly since their scientific investigations during the smart card era in the 1990s, and facilitates the development of novel countermeasures.
Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis
- Computer ScienceISSTA/ECOOP Workshops
- 2018
It is argued that electromagnetic side-channel analysis has significant potential to progress investigations obstructed by data encryption.
Side-Channel Attacks in the Internet of Things: Threats and Challenges
- Computer Science
- 2018
It is illustrated that microarchitectural attacks can compromise the entire IoT ecosystem: from devices in the field to servers in the backend, and new countermeasures are needed that effectively defend against both microarch Architectural and power/EM based side-channel attacks.
Side-Channel Attack on a Protected RFID Card
- Computer Science, MathematicsIEEE Access
- 2018
The security of the 3DES card can be easily compromised, using side-channel attacks, and it is recommended that the head and tail protection should extend to the first and last four rounds, at the minimal, in order to be side- channel attack resilience.
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
- Computer Science, MathematicsWISA
- 2009
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identification Devices (RFID) and develop techniques for facilitating a correlation power analysis…
Power and EM Attacks on Passive 13.56 MHz RFID Devices
- Computer ScienceCHES
- 2007
An overview of different measurement setups is provided and concrete results of power and EM attacks on two RFID prototype devices are presented, showing the need to include countermeasures into RFIDs.
Current Challenges and Future Research Areas for Digital Forensic Investigation
- Computer ScienceArXiv
- 2016
The current challenges contributing to the backlog in digital forensics from a technical standpoint are explored and a number of future research topics that could greatly contribute to a more efficient digital forensic process are outlined.
POSTER: Is Active Electromagnetic Side-channel Attack Practical?
- Computer ScienceCCS
- 2017
Through the extensive experiments using off-the-shelf hardware including software-defined radio (SDR) equipment, it is revealed that the required conditions for a successful RFRA are (1) up to a 10-Mbps of target signal and (2)up to a distance of 10 meters.
Comparison of electromagnetic side-channel energy available to the attacker from different computer systems
- Computer Science2015 IEEE International Symposium on Electromagnetic Compatibility (EMC)
- 2015
This paper evaluates electromagnetic (EM) side-channel energy (ESE) available to the attacker from several different computer systems. In particular, we present measured ESE for several common…
Full-Duplex Backscatter Interference Networks Based on Time-Hopping Spread Spectrum
- Computer ScienceIEEE Transactions on Wireless Communications
- 2017
Comprehensive performance analysis of BackCom networks is presented, including forward/backward bit-error rates and wireless ET efficiency and outage probabilities, which accounts for energy harvesting at tags, non-coherent and coherent detection at tags and readers, respectively, and the effects of asynchronous transmissions.