[Resource Topic] 2015/561: SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip

Welcome to the resource topic for 2015/561

Title:
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip

Authors: J. Longo, E. De Mulder, D. Page, M. Tunstall

Abstract:

Increased complexity in modern embedded systems has presented various important challenges with regard to side-channel attacks. In particular, it is common to deploy SoC-based target devices with high clock frequencies in security-critical scenarios; understanding how such features align with techniques more often deployed against simpler devices is vital from both destructive (i.e., attack) and constructive (i.e., evaluation and/or countermeasure) perspectives. In this paper, we investigate electromagnetic-based leakage from three different means of executing cryptographic workloads (including the general purpose ARM core, an on-chip co-processor, and the NEON core) on the AM335x SoC. Our conclusion is that addressing challenges of the type above {\em is} feasible, and that key recovery attacks can be conducted with modest resources.

ePrint: https://eprint.iacr.org/2015/561

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .