International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices

Authors:
Dennis R. E. Gnad , Karlsruhe Institute of Technology (KIT)
Jonas Krautter , Karlsruhe Institute of Technology (KIT)
Mehdi B. Tahoori , Karlsruhe Institute of Technology (KIT)
Download:
DOI: 10.13154/tches.v2019.i3.305-339
URL: https://tches.iacr.org/index.php/TCHES/article/view/8297
Search ePrint
Search Google
Presentation: Slides
Abstract: Microcontrollers and SoC devices have widely been used in Internet of Things applications. This also brings the question whether they lead to new security threats unseen in traditional computing systems. In fact, almost all modern SoC chips, particularly in the IoT domain, contain both analog and digital components, for various sensing and transmission tasks. Traditional remote-accessible online systems do not have this property, which can potentially become a security vulnerability. In this paper we demonstrate that such mixed-signal components, namely ADCs, expose a new security threat that allows attackers with ADC access to deduce the activity of a CPU in the system. To prove the leakage, we perform leakage assessment on three individual microcontrollers from two different vendors with various ADC settings. After showing a correlation of CPU activity with ADC noise, we continue with a leakage assessment of modular exponentiation and AES. It is shown that for all of these devices, leakage occurs for at least one algorithm and configuration of the ADC. Finally, we show a full key recovery attack on AES that works despite of the limited ADC sampling rate. These results imply that even remotely accessible microcontroller systems should be equipped with proper countermeasures against power analysis attacks, or restrict access to ADC data.
Video from TCHES 2019
BibTeX
@article{tches-2019-29327,
  title={Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices},
  journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
  publisher={Ruhr-Universität Bochum},
  volume={2019, Issue 3},
  pages={305-339},
  url={https://tches.iacr.org/index.php/TCHES/article/view/8297},
  doi={10.13154/tches.v2019.i3.305-339},
  author={Dennis R. E. Gnad and Jonas Krautter and Mehdi B. Tahoori},
  year=2019
}