Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978353
|View full text |Cite
|
Sign up to set email alerts
|

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

Abstract: We show that elliptic-curve cryptography implementations on mobile devices are vulnerable to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDSA secret signing keys from OpenSSL and CoreBitcoin running on iOS devices, and partial key leakage from OpenSSL running on Android and from iOS's Common-Crypto. These non-intrusive attacks use a simple magnetic probe placed in proximity to the device, or a power probe on the phone's USB cable. They use a bandwidth of merely a few hund… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
69
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 134 publications
(79 citation statements)
references
References 50 publications
1
69
0
Order By: Relevance
“…While physical side channel attacks can be used to extract secret information from complex devices such as PCs and mobile phones [15,16], these devices face additional threats that do not require external measurement equipment because they execute code from potentially unknown origins. While some software-based attacks exploit software vulnerabilities (such as buffer overflow or use-after-free vulnerabilities ) other software attacks leverage hardware vulnerabilities in order to leak sensitive information.…”
Section: Introductionmentioning
confidence: 99%
“…While physical side channel attacks can be used to extract secret information from complex devices such as PCs and mobile phones [15,16], these devices face additional threats that do not require external measurement equipment because they execute code from potentially unknown origins. While some software-based attacks exploit software vulnerabilities (such as buffer overflow or use-after-free vulnerabilities ) other software attacks leverage hardware vulnerabilities in order to leak sensitive information.…”
Section: Introductionmentioning
confidence: 99%
“…We will show how this monitoring app can utilize some OS-level sidechannel attack vectors on iOS (to be discussed shortly) to breach user privacy. Out of the scope are CPU cache side channels [66], electronic magnetic side channels [24], [39], [40], and mobile sensor based side channels [50], [52], [53], [57]. As they explore leakage through micro-architectures, electronic magnetic emission, or device orientation, which are not specific to iOS.…”
Section: A Threat Modelmentioning
confidence: 99%
“…For example, Marquardt et al utilized accelerometers on iPhone 4 to perform inference attack against a keyboard placed next to the device [48], while our work targets at other apps on the same device. Genkin et al [39] demonstrated that using magnetic probes placed close to the iPhone or power probes connected to the iPhone's USB cable, ECDSA keys used in OpenSSL and CoreBitcoin on iPhones can be extracted. Our attacks do not assume physical possession of the device by the attacker.…”
Section: Related Workmentioning
confidence: 99%
“…Solutions such as WeaselBoard [38] and CPAC [10] perform runtime PLC execution monitoring using control logic and firmware-level reference monitor implementations. Most related to our paper, there have been attack and defense solutions that employ side-channel analyses to either disclose secret information (e.g., cryptographic keys [17]), or detect anomalous misbehavior (e.g., execution tracking [31]). Side channel-based attacks require selective monitoring of only execution points of interest, such as the encryption subroutines.…”
Section: Introductionmentioning
confidence: 99%