2019
DOI: 10.1007/978-3-030-16458-4_2
|View full text |Cite
|
Sign up to set email alerts
|

Cache-Timing Attacks Still Threaten IoT Devices

Abstract: Deployed widely and embedding sensitive data, IoT devices depend on the reliability of cryptographic libraries to protect user information. However when implemented on real systems, cryptographic algorithms are vulnerable to side channel attacks based on their execution behavior, which can be revealed by measurements of physical quantities such as timing or power consumption. Some countermeasures can be implemented in order to prevent those attacks. However those countermeasures are generally designed at high … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 17 publications
0
14
0
Order By: Relevance
“…In addition to studying and validating attacks on the virtual platform, it is important for the tool to be able to uncover new attacks, from static or symbolic source code analysis or from dynamic trace analysis, while also being able to detect abnormal behavior on a real SoC which could hide undocumented security features [17]. It is worth mentioning that the virtual platform can be used in combination with existing security evaluation tools: for example, a vulnerability identification step can be performed by static and symbolic analysis of source code [9], [42], which are functionalities embedded in the Catalyzr™ tool developed by Secure-IC. The found vulnerabilities may then be analyzed in depth with the virtual platform.…”
Section: Analysis Methods a Principle And Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to studying and validating attacks on the virtual platform, it is important for the tool to be able to uncover new attacks, from static or symbolic source code analysis or from dynamic trace analysis, while also being able to detect abnormal behavior on a real SoC which could hide undocumented security features [17]. It is worth mentioning that the virtual platform can be used in combination with existing security evaluation tools: for example, a vulnerability identification step can be performed by static and symbolic analysis of source code [9], [42], which are functionalities embedded in the Catalyzr™ tool developed by Secure-IC. The found vulnerabilities may then be analyzed in depth with the virtual platform.…”
Section: Analysis Methods a Principle And Challengesmentioning
confidence: 99%
“…c) Defenses: Several past work have tried to provide a framework to evaluate attacks on real hardware. Some approaches use dynamic analysis [47], static analysis [9], [13], [42], or a combination of static and dynamic analysis [46], while other approaches directly measure cache hits and misses [21], [48] to find paths of exploitation for vulnerable implementations.…”
Section: State Of the Artmentioning
confidence: 99%
“…• Replay attack: The adversary manages to collect authentic information and re-transmits it illegitimately [27]: Later, the adversary deceives the receiver to perform unwanted actions. • Timing attack: The adversary tries to discover vulnerabilities in the security mechanisms by observing a node's response time to various queries, input, or cryptographic algorithms [28]. The adversary targets nodes with weak computing capabilities to implement timing attacks.…”
Section: Fig 3 Ec-cavs Attack Taxonomymentioning
confidence: 99%
“…The attack targets nodes having weak computing capabilities [82]. The attacker discovers vulnerabilities and learns about the security mechanisms employed within a system by observing the system's response time to various queries, input, or cryptographic algorithms.…”
Section: Replay Attackmentioning
confidence: 99%