Systematic classification of side-channel attacks: A case study for mobile devices
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their
pertinence to digital forensic investigations will increase into the foreseeable future. These …
pertinence to digital forensic investigations will increase into the foreseeable future. These …
ECDSA key extraction from mobile devices via nonintrusive physical side channels
We show that elliptic-curve cryptography implementations on mobile devices are vulnerable
to electromagnetic and power side-channel attacks. We demonstrate full extraction of …
to electromagnetic and power side-channel attacks. We demonstrate full extraction of …
Hot Pixels: Frequency, Power, and Temperature Attacks on {GPUs} and Arm {SoCs}
The drive to create thinner, lighter, and more energy efficient devices has resulted in modern
SoCs being forced to balance a delicate tradeoff between power consumption, heat …
SoCs being forced to balance a delicate tradeoff between power consumption, heat …
LadderLeak: Breaking ECDSA with less than one bit of nonce leakage
Although it is one of the most popular signature schemes today, ECDSA presents a number
of implementation pitfalls, in particular due to the very sensitive nature of the random value …
of implementation pitfalls, in particular due to the very sensitive nature of the random value …
Hardware-backed heist: Extracting ECDSA keys from qualcomm's trustzone
K Ryan - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
Trusted Execution Environments (TEEs) such as ARM TrustZone are in widespread use in
both mobile and embedded devices, and they are used to protect sensitive secrets while …
both mobile and embedded devices, and they are used to protect sensitive secrets while …
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
Minerva: The curse of ECDSA nonces: Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
We present our discovery of a group of side-channel vulnerabilities in implementations of
the ECDSA signature algorithm in a widely used Atmel AT90SC FIPS 140-2 certified …
the ECDSA signature algorithm in a widely used Atmel AT90SC FIPS 140-2 certified …
Synesthesia: Detecting screen content via remote acoustic side channels
We show that subtle acoustic noises emanating from within computer screens can be used
to detect the content displayed on the screens. This sound can be picked up by ordinary …
to detect the content displayed on the screens. This sound can be picked up by ordinary …
Uncovering user interactions on smartphones via contactless wireless charging side channels
Today, there is an increasing number of smartphones supporting wireless charging that
leverages electromagnetic induction to transmit power from a wireless charger to the …
leverages electromagnetic induction to transmit power from a wireless charger to the …