2014
DOI: 10.1007/978-3-662-44709-3_14
|View full text |Cite
|
Sign up to set email alerts
|

Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs

Abstract: We demonstrate physical side-channel attacks on a popular software implementation of RSA and ElGamal, running on laptop computers. Our attacks use novel side channels, based on the observation that the "ground" electric potential, in many computers, fluctuates in a computation-dependent way. An attacker can measure this signal by touching exposed metal on the computer's chassis with a plain wire, or even with a bare hand. The signal can also be measured at the remote end of Ethernet, VGA or USB cables. Through… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
55
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 75 publications
(55 citation statements)
references
References 16 publications
(24 reference statements)
0
55
0
Order By: Relevance
“…Emanations of interest have been shown at the USB port [30] and through the power outlet [12]. Recently, low-bandwidth physical side-channel key-extraction attacks on PCs were demonstrated [20,21], utilizing various physical channels. These last two works presented two different lowbandwidth attacks, with different equipment and attack time requirements:…”
Section: Overviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Emanations of interest have been shown at the USB port [30] and through the power outlet [12]. Recently, low-bandwidth physical side-channel key-extraction attacks on PCs were demonstrated [20,21], utilizing various physical channels. These last two works presented two different lowbandwidth attacks, with different equipment and attack time requirements:…”
Section: Overviewmentioning
confidence: 99%
“…See Table 1 for a comparison. Another limitation of [20,21] is that they target the square-and-multiply algorithm. These attacks do not work for sliding-window or fixed-window exponentiation, used in most RSA and ElGamal implementations nowadays.…”
Section: Overviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Side-channels infer secrets (e.g. cryptographic keys) by observing power consumption [8,20,25,27], sound [5,12,33], electromagnetic (EM) emanations [2,17,24], behavior under faults [9,19], and performance of shared caches [6,36,38], instruction caches, branch predictors [1], etc. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first page.…”
Section: Introductionmentioning
confidence: 99%