2019
DOI: 10.1016/j.diin.2019.03.002
|View full text |Cite
|
Sign up to set email alerts
|

A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics

Abstract: The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their pertinence to digital forensic investigations will increase into the foreseeable future. These devices produced by various vendors often posses limited standard interfaces for communication, such as USB ports or WiFi/Bluetooth wireless interfaces. Meanwhile, with an increasing mainstream focus on the security and privacy of user data, built-in encryption is becoming commonplace in consumer-level computing devices, a… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 77 publications
(45 citation statements)
references
References 78 publications
0
43
0
2
Order By: Relevance
“…A possible research direction could be the use of physical side-channel analysis for also defending intrusions against such devices. In fact, this idea is not new, as it has already been explored in recent works mainly for industrial and other kind of IoT devices [99][100][101][102]. (n)…”
Section: (D)mentioning
confidence: 99%
“…A possible research direction could be the use of physical side-channel analysis for also defending intrusions against such devices. In fact, this idea is not new, as it has already been explored in recent works mainly for industrial and other kind of IoT devices [99][100][101][102]. (n)…”
Section: (D)mentioning
confidence: 99%
“…These algorithms require the EM traces to be precisely aligned in the time-domain in order to succeed. Due to the nature of EM trace extraction, minor misalignments often force the attacker to extract more EM traces -this alignment issue can be greatly improved by ML [93]. Furthermore, these algorithms can take a considerable time to complete, making them difficult to be used in live device investigation scenarios in digital forensics [60,107,124].…”
Section: Forensics On Encrypted Datamentioning
confidence: 99%
“…There are two potential avenues for EM-SCA that can be assisted by AI techniques; gaining useful insights without accessing the encrypted content, and performing cryptographic key retrieval attacks. Towards the first goal, various AI approaches have been applied using power and electromagnetic side-channel observational data [93]. Knowing whether a target device is running the expected software/firmware can be useful to the investigator, i.e., a malicious user may have modified the firmware.…”
Section: State Of the Art Of Ai On Handling Encryptedmentioning
confidence: 99%
“…As existing work has shown, software activities running on IoT devices can be detected through EM-SCA techniques. In order to use these attacks for digital forensic purposes, these attacks must work in real-world conditions, such as target devices with zero or minimal knowledge, and devices placed in noisy environments [9].…”
Section: Related Workmentioning
confidence: 99%
“…However, the firmware of many IoT devices are not updated after they are shipped. Therefore, a known EM side-channel of an IoT device can remain exploitable for the rest of its service life [9].…”
Section: Incorporation Into the Digital Forensic Workflowmentioning
confidence: 99%