2014
DOI: 10.1007/978-3-662-43414-7_29
|View full text |Cite
|
Sign up to set email alerts
|

When Reverse-Engineering Meets Side-Channel Analysis – Digital Lockpicking in Practice

Abstract: Abstract. In the past years, various electronic access control systems have been found to be insecure. In consequence, attacks have emerged that permit unauthorized access to secured objects. One of the few remaining, allegedly secure digital locking systems-the system 3060 manufactured and marketed by SimonsVoss-is employed in numerous objects worldwide. Following the trend to analyze the susceptibility of real-world products towards implementation attacks, we illustrate our approach to understand the unknown… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Adding noise into the traces is an alternative approach, as the injected artifical noise makes information extraction more difficult for attackers [Demme et al 2012]. Another approach is to frequently derive and update key information such that the side-channel attacker cannot gather sufficient information for breaking the key value before the next key update [Oswald et al 2014;Xiao et al 2014]. Physical unclonable functions (PUFs) are an effective hardware security solution [Suh and Devadas 2007;Holcomb and Fu 2014]; however, side-channel attacks can still break PUFs [Rostami et al 2014].…”
Section: Maximizementioning
confidence: 99%
“…Adding noise into the traces is an alternative approach, as the injected artifical noise makes information extraction more difficult for attackers [Demme et al 2012]. Another approach is to frequently derive and update key information such that the side-channel attacker cannot gather sufficient information for breaking the key value before the next key update [Oswald et al 2014;Xiao et al 2014]. Physical unclonable functions (PUFs) are an effective hardware security solution [Suh and Devadas 2007;Holcomb and Fu 2014]; however, side-channel attacks can still break PUFs [Rostami et al 2014].…”
Section: Maximizementioning
confidence: 99%
“…SCA has gained considerable attention since its introduction in 1996 [1]. One reason for this is that many realworld targets were broken due to their susceptibility to side-channel attacks (e.g., [10] and [12]- [15]).…”
Section: Side-channel Analysismentioning
confidence: 99%
“…The widespread digital locking system 3060 analyzed in [7] and [10] is based on an undisclosed, proprietary cryptographic protocol. The latest revision is termed ''Generation 2'' or ''G2-based'' system by the manufacturer.…”
Section: Case Study I: the Simonsvoss Digital Locking Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…The physical properties that can be extracted are, for examples, the execution time of a cryptographic algorithm [1], the electromagnetic emanation [2] or the power consumption of the device [3]. From an industrial point of view, side-channel attacks lead to extremely effective and successful attacks against (certified and uncertified) industrial products [4][5][6].…”
Section: Introductionmentioning
confidence: 99%