Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography

Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of dedicated methods to localise them. Few methods have b...

Full description

Bibliographic Details
Main Authors: Laurent Sauvage, Sylvain Guilley, Florent Flament, Jean-Luc Danger, Yves Mathieu
Format: Article
Language:English
Published: Hindawi Limited 2012-01-01
Series:International Journal of Reconfigurable Computing
Online Access:http://dx.doi.org/10.1155/2012/360242
id doaj-0cb03a0085e44b0eb715c6dc0107af50
record_format Article
spelling doaj-0cb03a0085e44b0eb715c6dc0107af502020-11-24T22:07:59ZengHindawi LimitedInternational Journal of Reconfigurable Computing1687-71951687-72092012-01-01201210.1155/2012/360242360242Blind Cartography for Side Channel Attacks: Cross-Correlation CartographyLaurent Sauvage0Sylvain Guilley1Florent Flament2Jean-Luc Danger3Yves Mathieu4Télécom ParisTech, Institut Télécom CNRS LTCI, 46 rue Barrault, F-75634 Paris Cedex 13, FranceTélécom ParisTech, Institut Télécom CNRS LTCI, 46 rue Barrault, F-75634 Paris Cedex 13, FranceTélécom ParisTech, Institut Télécom CNRS LTCI, 46 rue Barrault, F-75634 Paris Cedex 13, FranceTélécom ParisTech, Institut Télécom CNRS LTCI, 46 rue Barrault, F-75634 Paris Cedex 13, FranceTélécom ParisTech, Institut Télécom CNRS LTCI, 46 rue Barrault, F-75634 Paris Cedex 13, FranceSide channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of dedicated methods to localise them. Few methods have been proposed in the past, and all of them aim at pinpointing the cryptoprocessor. However it could be interesting to exploit the activity of other parts of the application, in order to increase the attack's efficiency or to bypass its countermeasures. In this paper, we present a localisation method based on cross-correlation, which issues a list of areas of interest within the attacked device. It realizes an exhaustive analysis, since it may localise any module of the device, and not only those which perform cryptographic operations. Moreover, it also does not require a preliminary knowledge about the implementation, whereas some previous cartography methods require that the attacker could choose the cryptoprocessor inputs, which is not always possible. The method is experimentally validated using observations of the electromagnetic near field distribution over a Xilinx Virtex 5 FPGA. The matching between areas of interest and the application layout in the FPGA floorplan is confirmed by correlation analysis.http://dx.doi.org/10.1155/2012/360242
collection DOAJ
language English
format Article
sources DOAJ
author Laurent Sauvage
Sylvain Guilley
Florent Flament
Jean-Luc Danger
Yves Mathieu
spellingShingle Laurent Sauvage
Sylvain Guilley
Florent Flament
Jean-Luc Danger
Yves Mathieu
Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography
International Journal of Reconfigurable Computing
author_facet Laurent Sauvage
Sylvain Guilley
Florent Flament
Jean-Luc Danger
Yves Mathieu
author_sort Laurent Sauvage
title Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography
title_short Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography
title_full Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography
title_fullStr Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography
title_full_unstemmed Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography
title_sort blind cartography for side channel attacks: cross-correlation cartography
publisher Hindawi Limited
series International Journal of Reconfigurable Computing
issn 1687-7195
1687-7209
publishDate 2012-01-01
description Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of dedicated methods to localise them. Few methods have been proposed in the past, and all of them aim at pinpointing the cryptoprocessor. However it could be interesting to exploit the activity of other parts of the application, in order to increase the attack's efficiency or to bypass its countermeasures. In this paper, we present a localisation method based on cross-correlation, which issues a list of areas of interest within the attacked device. It realizes an exhaustive analysis, since it may localise any module of the device, and not only those which perform cryptographic operations. Moreover, it also does not require a preliminary knowledge about the implementation, whereas some previous cartography methods require that the attacker could choose the cryptoprocessor inputs, which is not always possible. The method is experimentally validated using observations of the electromagnetic near field distribution over a Xilinx Virtex 5 FPGA. The matching between areas of interest and the application layout in the FPGA floorplan is confirmed by correlation analysis.
url http://dx.doi.org/10.1155/2012/360242
work_keys_str_mv AT laurentsauvage blindcartographyforsidechannelattackscrosscorrelationcartography
AT sylvainguilley blindcartographyforsidechannelattackscrosscorrelationcartography
AT florentflament blindcartographyforsidechannelattackscrosscorrelationcartography
AT jeanlucdanger blindcartographyforsidechannelattackscrosscorrelationcartography
AT yvesmathieu blindcartographyforsidechannelattackscrosscorrelationcartography
_version_ 1725818264883298304