Abstract
Increased complexity in modern embedded systems has presented various important challenges with regard to side-channel attacks. In particular, it is common to deploy SoC-based target devices with high clock frequencies in security-critical scenarios; understanding how such features align with techniques more often deployed against simpler devices is vital from both destructive (i.e., attack) and constructive (i.e., evaluation and/or countermeasure) perspectives. In this paper, we investigate electromagnetic-based leakage from three different means of executing cryptographic workloads (including the general purpose ARM core, an on-chip co-processor, and the NEON core) on the AM335x SoC. Our conclusion is that addressing challenges of the type above is feasible, and that key recovery attacks can be conducted with modest resources.
Original language | English |
---|---|
Title of host publication | Cryptographic Hardware and Embedded Systems - CHES 2015 |
Publisher | Springer |
Pages | 620-640 |
Number of pages | 21 |
Volume | 9293 |
Edition | 1 |
ISBN (Electronic) | 9783662483244 |
ISBN (Print) | 9783662483237 |
DOIs | |
Publication status | Published - 1 Sept 2015 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 9293 |
ISSN (Print) | 0302-9743 |
Keywords
- Side-channel attacks
- electromagnetic
- system-on-chip
- ARM
- NEON
Fingerprint
Dive into the research topics of 'SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip'. Together they form a unique fingerprint.Profiles
-
Dr Daniel Page
- School of Computer Science - Senior Lecturer in Computer Science
- Cryptography and Information Security
Person: Academic , Member