A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics

@article{Sayakkara2019ASO,
  title={A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics},
  author={Asanka P. Sayakkara and Nhien-An Le-Khac and M. Scanlon},
  journal={Digit. Investig.},
  year={2019},
  volume={29},
  pages={43-54}
}

Figures and Tables from this paper

Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets

A comprehensive EM side-channel dataset representing a diverse collection of popular IoT devices and smartphones is presented to demonstrate the potential usage of machine learning models to recognise device behaviour.

Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices

A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks

This work provides a comprehensive, vis-à-vis comparison of the security aspects of the thus far most widespread IoT Wireless Personal Area Network (WPAN) protocols, namely BLE, Z-Wave, ZigBee, Thread, and EnOcean.

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT

A summary of the related literature (IoT, lightweight cryptography, side-channel attacks and EMA), the methodology, current outcomes and future plans for the optimised results are provided.

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher

This work aims to determine the probability of secret key leakage with a minimum number of electromagnetic (EM) waveforms possible, and presents the methodology in attack modelling, current results that indicate a probability of leaking seven bytes of the key and upcoming plans for optimisation.

Electromagnetic Fields as a Sign of Side-Channel Attacks in GSM Module

  • V. GustovA. Levina
  • Computer Science
    2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
  • 2021
An overview of various methods of detecting unauthorized access in mobile communication devices is offered, as a result of which it becomes possible to automate the analysis and determine the legitimacy of the radio transmitting modules.

ULTRA-LIGHTWEIGHT CIPHER: PRESENT

A summary of the related literature (IoT, lightweight cryptography, side-channel attacks and EMA), the methodology, current outcomes and future plans for the optimised results are provided.

A Secure and Anonymous Communicate Scheme over the Internet of Things

The authors design a lightweight communication scheme for the remote-control system in this work, using two kinds of Virtual-Spaces to achieve the purpose of identity announced and data exchanged and believe that the scheme is practical and is suitable for scenarios that are not time-sensitive but require high anonymity.

References

SHOWING 1-10 OF 140 REFERENCES

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

This paper proposes a new categorization system for side-channel attacks, necessary as side- channel attacks have evolved significantly since their scientific investigations during the smart card era in the 1990s, and facilitates the development of novel countermeasures.

Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis

It is argued that electromagnetic side-channel analysis has significant potential to progress investigations obstructed by data encryption.

Side-Channel Attacks in the Internet of Things: Threats and Challenges

It is illustrated that microarchitectural attacks can compromise the entire IoT ecosystem: from devices in the field to servers in the backend, and new countermeasures are needed that effectively defend against both microarch Architectural and power/EM based side-channel attacks.

Side-Channel Attack on a Protected RFID Card

The security of the 3DES card can be easily compromised, using side-channel attacks, and it is recommended that the head and tail protection should extend to the first and last four rounds, at the minimal, in order to be side- channel attack resilience.

EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment

We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identification Devices (RFID) and develop techniques for facilitating a correlation power analysis

Power and EM Attacks on Passive 13.56 MHz RFID Devices

An overview of different measurement setups is provided and concrete results of power and EM attacks on two RFID prototype devices are presented, showing the need to include countermeasures into RFIDs.

Current Challenges and Future Research Areas for Digital Forensic Investigation

The current challenges contributing to the backlog in digital forensics from a technical standpoint are explored and a number of future research topics that could greatly contribute to a more efficient digital forensic process are outlined.

POSTER: Is Active Electromagnetic Side-channel Attack Practical?

Through the extensive experiments using off-the-shelf hardware including software-defined radio (SDR) equipment, it is revealed that the required conditions for a successful RFRA are (1) up to a 10-Mbps of target signal and (2)up to a distance of 10 meters.

Comparison of electromagnetic side-channel energy available to the attacker from different computer systems

This paper evaluates electromagnetic (EM) side-channel energy (ESE) available to the attacker from several different computer systems. In particular, we present measured ESE for several common

Full-Duplex Backscatter Interference Networks Based on Time-Hopping Spread Spectrum

Comprehensive performance analysis of BackCom networks is presented, including forward/backward bit-error rates and wireless ET efficiency and outage probabilities, which accounts for energy harvesting at tags, non-coherent and coherent detection at tags and readers, respectively, and the effects of asynchronous transmissions.
...