screaming ch channels
play

Screaming Ch Channels When Electromagnetic Side Channels Meet Radio - PowerPoint PPT Presentation

Screaming Ch Channels When Electromagnetic Side Channels Meet Radio Transceivers Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurlien Francillon Whats this all about? - A nov novel attack ex exploiting g EM side


  1. Screaming Ch Channels When Electromagnetic Side Channels Meet Radio Transceivers Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon

  2. What’s this all about? - A nov novel attack ex exploiting g EM side cha channels from om a di distance - A A PoC oC implementation on up up to 10m 0m di dist stance (with dem demo!) - Wher Where to go o from om he here?

  3. Let’s start from the beginning

  4. Leaks in rad adio io si signals AES128(K,P)

  5. Agenda From the state of the art to a novel attack

  6. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  7. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  8. Side channel bas asic ics • Even provably secure cryptography may be broken if some intermediate computations are visible • Physical implementations may leak intermediate data • Attackers observe the leaks and reconstruct cryptographic secrets

  9. Side channel bas asic ics ChipWhisperer! https://wiki.newae.com/File:Cw1173_microusb.jpg

  10. El Elect ctromagnetic ic Side-Channel els • Data-dependent EM leaks occur because: • Digital logic consumes current when switching • Current variations generate EM emissions • Similar to power side-channels • Known attacks: Kasper et al. [1] Genkin et al. [2] TEMPEST [3] Distance

  11. Correla latio ion attack ck basic sics • An intuitive attack, there are many more • Ingredients: • Known Plaintext } Leak model • State non-linear in Plaintext and Key • Leak linear in the State K Leak P State

  12. Correla latio ion attack ck basic sics • Recipe: 1. Encrypt many times and measure the Leaks 2. Guess a byte of the Key and compute the States 3. Check if the Measurements correlate with the Computations 4. Repeat for each byte of the key K Measured Computed P

  13. Correla latio ion attack ck basic sics • Recipe: 𝑔𝑝𝑠 𝒄𝒛𝒖𝒇 𝑗𝑜 𝒍𝒇𝒛: 𝑔𝑝𝑠 𝒉𝒗𝒇𝒕𝒕 𝑗𝑜 𝟏 𝑢𝑝 𝟑𝟔𝟔: 1. Encrypt many times and measure the Leaks 𝑠𝑏𝑜𝑙𝑡[𝑕𝑣𝑓𝑡𝑡] = 𝑑𝑝𝑠𝑠𝑓𝑚𝑏𝑢𝑗𝑝𝑜(𝑚𝑓𝑏𝑙, 𝑕𝑣𝑓𝑡𝑡) 2. Guess a byte of the Key and the corresponding States 𝑕𝑣𝑓𝑡𝑡 𝑐𝑓𝑡𝑢 [𝑐𝑧𝑢𝑓] = 𝑏𝑠𝑕𝑛𝑏𝑦(𝑠𝑏𝑜𝑙𝑡) 3. The guess is right iff the Leaks are linear with the States 4. Repeat for each byte of the key K Leak P State

  14. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - The Hypothesis - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  15. A Simple Wave 1.25 λ 1 Amplitude 0.75 a 0.5 0.25 0 -0.25 -0.5 c -0.75 -1 -1.25 Distance

  16. A Simple Wave 1.25 λ Spectrum 1 Power Amplitude 0.75 a 0.5 0.25 0 f Frequency -0.25 -0.5 c -0.75 -1 -1.25 Distance

  17. Mo Modula lation Basics sics Information Amplitude Carrier AM Signal Time

  18. Mo Modula lation Basics sics Information Amplitude Spectrum Power Carrier f c +f i f c -f i f c AM Signal Time

  19. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  20. Mi Mixed ed-sig ignal l chip ips • Examples • Look around… • BT, WiFi, GPS, etc. • Idea • Combine digital processor and analog radio on a single chip • Integrate the two and provide an easy interface to the outside • Benefits • Cheap • Small • Power efficient • Nice for developers

  21. A big proble lem: Noise • Digital logic produces noise • Close physical proximity facilitates noise propagation • Analog radio is sensitive to noise • Designers care about functionality

  22. Wha What t if di digit ital l no nois ise e wi with th sensit itiv ive inf nform rmatio tion lea eaks s into the he ra radio o signal?

  23. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  24. So the journey y begin ins...

  25. Di Disc scover ery of a leak • After months of trying: • Multiple chips • Custom firmware • One day: • Accidental tuning on "wrong" frequency • A leak dependent on our computations • So the investigation started

  26. Di Disc scover ery of a leak Simple Firmware: P - TX off/on (CW) - Slow loop/fast loop - Controlled via UART f Software Mixed-signal 2.4 GHz Defined Radio chip

  27. Di Disc scover ery of a leak P f Software Mixed-signal Defined Radio chip

  28. Di Disc scover ery of a leak P - Slow loop - TX off - Close distance f Spectrum 64 MHz Mixed-signal Analyzer chip

  29. Di Disc scover ery of a leak P - Fast loop - TX off - Close distance f Spectrum 64 MHz Mixed-signal Analyzer chip

  30. Di Disc scover ery of a leak P - Slow loop - TX on f Spectrum 64 MHz Mixed-signal 2.4 GHz Analyzer chip

  31. Di Disc scover ery of a leak P - Fast loop - TX on f Spectrum 64 MHz Mixed-signal 2.4 GHz Analyzer chip

  32. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  33. Logic ic Transmiss ssio ion Scheme P f 64 MHz 2.4 GHz 64 MHz Digital noise Radio Clock BT Carrier (64MHz) (2.4GHz)

  34. Conventio ional P • Current consumption • Mixing f 64 MHz Digital noise Clock (64MHz)

  35. Conventio ional 𝑾 𝑻𝒗𝒒𝒒𝒎𝒛 • Current consumption 𝑱 • Dependent on 𝑾 𝒋𝒐 𝑾 𝒑𝒗𝒖 transitions of logic values 𝑫 𝑸𝒃𝒔𝒃𝒕𝒋𝒖𝒋𝒅 • Mixing 𝑯𝒐𝒆 𝑱 t 𝑾 𝒑𝒗𝒖 : 𝟏 → 𝟐

  36. Conventio ional 𝑾 𝑻𝒗𝒒𝒒𝒎𝒛 • Current consumption 𝑱 • Dependent on 𝑾 𝒋𝒐 𝑾 𝒑𝒗𝒖 transitions of logic values 𝑫 𝑸𝒃𝒔𝒃𝒕𝒋𝒖𝒋𝒅 • Mixing 𝑯𝒐𝒆 𝑱 t 𝑾 𝒑𝒗𝒖 : 𝟐 → 𝟏 𝑾 𝒑𝒗𝒖 : 𝟏 → 𝟐

  37. Conventio ional • Current consumption 𝑬𝒃𝒖𝒃 𝒎𝒋𝒐𝒇 • Dependent on transitions of logic values • Mixing 𝑫𝒎𝒍 • Clock • 1: “direct” Carrier Modulation

  38. Conventio ional • Current consumption • Dependent on transitions of logic 𝑱 𝒕𝒃𝒖 = α( 𝑾 𝟐 + 𝑾 𝟑 − 𝑾 𝒖𝒊 ) 𝟑 = values = 𝑾 𝟐 + 𝑾 𝟑 • Mixing 𝟑 𝑾 𝟐 × 𝑾 𝟑 + 𝒇𝒖𝒅. • Clock • 1: “direct” nMOS transistor • 2: non-linear in saturation components

  39. Screa eaming Channels ls P • Digital to Analog propagation • Mixing f 64 MHz 2.4 GHz 64 MHz Digital noise Radio Clock BT Carrier (64MHz) (2.4GHz)

  40. Screa eaming Channels ls 𝑾 𝑻𝒗𝒒𝒒𝒎𝒛 P • Digital to Analog propagation • 1: Substrate Coupling • Same silicon die • 2: Power Supply Coupling f 64 MHz • Same power supply • Mixing Digital noise Digital Analog Clock Substrate (64MHz)

  41. Screa eaming Channels ls Noise from the P • Digital to Analog propagation digital domain 1. Substrate Coupling I • Same silicon die 2. Power Supply Coupling f 64 MHz • Same power supply 𝟏° • Mixing PA VCO Digital noise 𝟘𝟏° 1. Voltage Controlled Oscillator 2. Power Amplifier Q DAC 3. etc. Clock (64MHz) (Analog) TX

  42. Summing Up Generation "Spectrum Spraying" Propagation Radio Transmission

  43. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  44. AES in the e sp spec ectrogram Radio On AES On Radio Off

  45. AES in the e sp spec ectrogram Radio On AES On Radio Off

  46. AES in the e sp spec ectrogram Radio On AES On Radio Off

  47. AES in the e sp spec ectrogram Radio On AES On Radio Off

  48. AES in the e sp spec ectrogram Radio On AES On Radio Off

  49. AES in the e sp spec ectrogram Radio On AES On Radio Off

  50. Ex Extract ctio ion and alignmen ent Packets Trigger Frequency

  51. Ex Extract ctio ion and alignmen ent Self-correlation alignment Average

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend