Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography
Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of dedicated methods to localise them. Few methods have b...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2012-01-01
|
Series: | International Journal of Reconfigurable Computing |
Online Access: | http://dx.doi.org/10.1155/2012/360242 |
id |
doaj-0cb03a0085e44b0eb715c6dc0107af50 |
---|---|
record_format |
Article |
spelling |
doaj-0cb03a0085e44b0eb715c6dc0107af502020-11-24T22:07:59ZengHindawi LimitedInternational Journal of Reconfigurable Computing1687-71951687-72092012-01-01201210.1155/2012/360242360242Blind Cartography for Side Channel Attacks: Cross-Correlation CartographyLaurent Sauvage0Sylvain Guilley1Florent Flament2Jean-Luc Danger3Yves Mathieu4Télécom ParisTech, Institut Télécom CNRS LTCI, 46 rue Barrault, F-75634 Paris Cedex 13, FranceTélécom ParisTech, Institut Télécom CNRS LTCI, 46 rue Barrault, F-75634 Paris Cedex 13, FranceTélécom ParisTech, Institut Télécom CNRS LTCI, 46 rue Barrault, F-75634 Paris Cedex 13, FranceTélécom ParisTech, Institut Télécom CNRS LTCI, 46 rue Barrault, F-75634 Paris Cedex 13, FranceTélécom ParisTech, Institut Télécom CNRS LTCI, 46 rue Barrault, F-75634 Paris Cedex 13, FranceSide channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of dedicated methods to localise them. Few methods have been proposed in the past, and all of them aim at pinpointing the cryptoprocessor. However it could be interesting to exploit the activity of other parts of the application, in order to increase the attack's efficiency or to bypass its countermeasures. In this paper, we present a localisation method based on cross-correlation, which issues a list of areas of interest within the attacked device. It realizes an exhaustive analysis, since it may localise any module of the device, and not only those which perform cryptographic operations. Moreover, it also does not require a preliminary knowledge about the implementation, whereas some previous cartography methods require that the attacker could choose the cryptoprocessor inputs, which is not always possible. The method is experimentally validated using observations of the electromagnetic near field distribution over a Xilinx Virtex 5 FPGA. The matching between areas of interest and the application layout in the FPGA floorplan is confirmed by correlation analysis.http://dx.doi.org/10.1155/2012/360242 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Laurent Sauvage Sylvain Guilley Florent Flament Jean-Luc Danger Yves Mathieu |
spellingShingle |
Laurent Sauvage Sylvain Guilley Florent Flament Jean-Luc Danger Yves Mathieu Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography International Journal of Reconfigurable Computing |
author_facet |
Laurent Sauvage Sylvain Guilley Florent Flament Jean-Luc Danger Yves Mathieu |
author_sort |
Laurent Sauvage |
title |
Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography |
title_short |
Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography |
title_full |
Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography |
title_fullStr |
Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography |
title_full_unstemmed |
Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography |
title_sort |
blind cartography for side channel attacks: cross-correlation cartography |
publisher |
Hindawi Limited |
series |
International Journal of Reconfigurable Computing |
issn |
1687-7195 1687-7209 |
publishDate |
2012-01-01 |
description |
Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of dedicated methods to localise them. Few methods have been proposed in the past, and all of them aim at pinpointing the cryptoprocessor. However it could be interesting to exploit the activity of other parts of the application, in order to increase the attack's efficiency or to bypass its countermeasures. In this paper, we present a localisation method based on cross-correlation, which issues a list of areas of interest within the attacked device. It realizes an exhaustive analysis, since it may localise any module of the device, and not only those which perform cryptographic operations. Moreover, it also does not require a preliminary knowledge about the implementation, whereas some previous cartography methods require that the attacker could choose the cryptoprocessor inputs, which is not always possible. The method is experimentally validated using observations of the electromagnetic near field distribution over a Xilinx Virtex 5 FPGA. The matching between areas of interest and the application layout in the FPGA floorplan is confirmed by correlation analysis. |
url |
http://dx.doi.org/10.1155/2012/360242 |
work_keys_str_mv |
AT laurentsauvage blindcartographyforsidechannelattackscrosscorrelationcartography AT sylvainguilley blindcartographyforsidechannelattackscrosscorrelationcartography AT florentflament blindcartographyforsidechannelattackscrosscorrelationcartography AT jeanlucdanger blindcartographyforsidechannelattackscrosscorrelationcartography AT yvesmathieu blindcartographyforsidechannelattackscrosscorrelationcartography |
_version_ |
1725818264883298304 |