2016
DOI: 10.1007/978-3-319-29485-8_14
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
33
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(33 citation statements)
references
References 19 publications
0
33
0
Order By: Relevance
“…We will show how this monitoring app can utilize some OS-level sidechannel attack vectors on iOS (to be discussed shortly) to breach user privacy. Out of the scope are CPU cache side channels [66], electronic magnetic side channels [24], [39], [40], and mobile sensor based side channels [50], [52], [53], [57]. As they explore leakage through micro-architectures, electronic magnetic emission, or device orientation, which are not specific to iOS.…”
Section: A Threat Modelmentioning
confidence: 99%
“…We will show how this monitoring app can utilize some OS-level sidechannel attack vectors on iOS (to be discussed shortly) to breach user privacy. Out of the scope are CPU cache side channels [66], electronic magnetic side channels [24], [39], [40], and mobile sensor based side channels [50], [52], [53], [57]. As they explore leakage through micro-architectures, electronic magnetic emission, or device orientation, which are not specific to iOS.…”
Section: A Threat Modelmentioning
confidence: 99%
“…Hitherto the research community has focused on SCA attacks based on smartcards, RFID tags, FPGAs and microcontrollers, particularly by analysing electromagnetic (EM) emissions [11,24,25]. In more recent years the research community began to target the vulnerabilities of high powered devices such as laptops and smartphones to SCA attacks [26][27][28]. The focus of this research is on the Raspberry Pi 2B+, which is a higher frequency device as mentioned in Section 1., that has been selected as it is readily available, widely used and on occasions used in the role of a PLCs [12].…”
Section: Electromagnetic Attacksmentioning
confidence: 99%
“…Belgarric et al [27] and Genkin et al [28] concurrently demonstrated successful attacks on the Elliptic Curve Digital Signature Algorithm (ECDSA) implementation of Android's BouncyCastle library. A minor difference found in the two studies was that the work of Belgarric et al was intrusive as they placed the magnetic probe inside the smartphone where as Genkin et al was non-intrusive and placed the magnetic probe in close proximity of the device.…”
Section: Electromagnetic Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The RFC is intended to prevent use of curves which have inherent side-channel leakage weaknesses. Classical side-channel attacks against such poor ECC implementations are published regularly, e.g., [1] and [6].…”
Section: Introductionmentioning
confidence: 99%