2019
DOI: 10.1007/978-3-030-34618-8_10
|View full text |Cite
|
Sign up to set email alerts
|

Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages

Abstract: This publication is distributed under the terms of Article 25fa of the Dutch Copyright Act (Auteurswet) with explicit consent by the author. Dutch law entitles the maker of a short scientific work funded either wholly or partially by Dutch public funds to make that work publicly available for no consideration following a reasonable period of time after the work was first published, provided that clear reference is made to the source of the first publication of the work. This publication is distributed under Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 44 publications
0
6
0
Order By: Relevance
“…The work of Schlösser et al, (2013) successfully demonstrates identification of the exact SRAM location accessed during the activation of the substitution box (SBox) lookup table during AES encryption operations. Andrikos et al, (2019) uses neural networks and an information-based approach to retrieve information about the AES encryption key after finding the SRAM location of the lookup table containing the key by using the framework given in (Schlösser et al, 2013). They demonstrate a successful attack using memory table exploitation.…”
Section: Previous Researchmentioning
confidence: 99%
“…The work of Schlösser et al, (2013) successfully demonstrates identification of the exact SRAM location accessed during the activation of the substitution box (SBox) lookup table during AES encryption operations. Andrikos et al, (2019) uses neural networks and an information-based approach to retrieve information about the AES encryption key after finding the SRAM location of the lookup table containing the key by using the framework given in (Schlösser et al, 2013). They demonstrate a successful attack using memory table exploitation.…”
Section: Previous Researchmentioning
confidence: 99%
“…Thus, the robustness of this countermeasure depends on the used platform. Since, our target, a Cortex-M4 on an STM32F407IGT6 board, does not have data caches, the memory access is expected to be constant-time as long as the same SRAM region is accessed; 9 as shown in [2] this target has 2 different regions with different characteristics. To increase the probability that the memory accesses are to the same region, we declare the alternating operands as global variables next to each other.…”
Section: Implementations Of the Ladder Stepmentioning
confidence: 99%
“…First, when using EM as a side-channel source, the type of probe as well as its exact position, i.e., location and angle, play a crucial role (see for example [1]). In some situations, an attacker may not be able to precisely replicate the measurement setup from training on the attacked device.…”
Section: Transferring Between Em Probe Position and Typementioning
confidence: 99%