understanding screaming channels from a detailed analysis
play

Understanding Screaming Channels: From a Detailed Analysis to - PowerPoint PPT Presentation

Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks Giovanni Camurati*, Aurlien Francillon*, Franois-Xavier Standaert** *EURECOM, **Universit catholique de Louvain Who am I? Giovanni Camurati Ph.D. Student at


  1. Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks Giovanni Camurati*, Aurélien Francillon*, François-Xavier Standaert** *EURECOM, **Université catholique de Louvain

  2. Who am I? Giovanni Camurati Ph.D. Student at EURECOM, Sophia-Antipolis, France @GioCamurati https://giocamurati.github.io Side Channels and Radios What happens if radio transceivers are close to computing devices? Computer Architectures, Electronics, Embedded Systems Hardware Design, Firmware Rehosting, Hack@DAC with NOPS 2

  3. Why radios and computing devices? 3

  4. Modern Connected Devices Have Radios Mixed-signal architecture CPU + Crypto + Radio Same chip 4

  5. Modern Connected Devices Have Radios Mixed-signal architecture CPU + Crypto + Radio Same chip Benefits Low Power, Cheap, Small Easy to integrate 4

  6. Modern Connected Devices Have Radios Mixed-signal architecture CPU + Crypto + Radio Same chip Benefits Low Power, Cheap, Small Easy to integrate Examples BT, BLE, WiFi, GPS, etc 4

  7. What can go wrong? 5

  8. Screaming Channels [1], The Idea Mixed-signal chip 𝟕𝟓 𝑵𝑰𝒜 𝟑. 𝟓 𝑯𝑰𝒜 Noise sensitive transmitter 6

  9. Screaming Channels [1], The Idea Mixed-signal chip Strong noise 𝟕𝟓 𝑵𝑰𝒜 𝟑. 𝟓 𝑯𝑰𝒜 source Noise sensitive transmitter 6

  10. Screaming Channels [1], The Idea Mixed-signal chip Strong noise 𝟕𝟓 𝑵𝑰𝒜 𝟑. 𝟓 𝑯𝑰𝒜 source Noise sensitive transmitter 6

  11. Screaming Channels [1], The Idea Mixed-signal chip Strong noise 𝟕𝟓 𝑵𝑰𝒜 𝟑. 𝟓 𝑯𝑰𝒜 source Noise sensitive transmitter Easy propagation 6

  12. Screaming Channels [1], The Idea Mixed-signal chip Strong noise 𝟕𝟓 𝑵𝑰𝒜 𝟑. 𝟓 𝑯𝑰𝒜 source Noise sensitive transmitter Easy propagation 6

  13. Screaming Channels [1], The Idea Mixed-signal chip Strong noise 𝟕𝟓 𝑵𝑰𝒜 𝟑. 𝟓 𝑯𝑰𝒜 source Noise sensitive transmitter Easy propagation Leak Propagation 6

  14. Screaming Channels [1], The Idea Mixed-signal chip Strong noise 𝟕𝟓 𝑵𝑰𝒜 𝟑. 𝟓 𝑯𝑰𝒜 source Noise sensitive transmitter Easy propagation Leak Propagation 6

  15. Screaming Channels [1] in Action Antenna + SDR RX 𝟑𝒏 Cortex-M4 + BT TX 15

  16. Screaming Channels [1] in Action Antenna + SDR RX Radio Off 𝟑𝒏 Cortex-M4 + BT TX Noise 16

  17. Screaming Channels [1] in Action Radio Off Radio TX Antenna + SDR RX 𝟑𝒏 Cortex-M4 + BT TX Packet Noise 17

  18. Screaming Channels [1] in Action Radio Off Radio TX Antenna + SDR RX 𝟑𝒏 Cortex-M4 + BT TX Packet Noise 18

  19. Screaming Channels [1] in Action AES On Radio Off Radio TX Antenna + SDR RX 𝟑𝒏 Cortex-M4 + BT TX Packet Noise 19

  20. Screaming Channels [1] in Action AES On Radio Off Radio TX Antenna + SDR RX AES Starts 𝟑𝒏 Cortex-M4 + BT TX Packet Noise 20

  21. Screaming Channels [1] in Action AES On Radio Off Radio TX Antenna + SDR RX AES Starts Time domain 𝟑𝒏 Cortex-M4 + BT TX Packet Noise 21

  22. A New Threat [1] 8

  23. The "Screaming Channels" Leak Vector Idea, Root Cause, First Attack Intuition and root cause 10m in anechoic chamber Countermeasures 9

  24. The "Screaming Channels" Leak Vector Idea, Root Cause, First Attack CCS 2018 [1] & BHUSA18 [2] Intuition and root cause Camurati, Poeplau, Muench, 10m in anechoic chamber Hayes, Francillon Countermeasures 9

  25. The "Screaming Channels" Leak Vector Idea, Root Cause, First Attack CCS 2018 [1] & BHUSA18 [2] Intuition and root cause Camurati, Poeplau, Muench, 10m in anechoic chamber Hayes, Francillon Countermeasures Systematic Analysis Data/leak coexistence Distortion, profile reuse, etc. Improved Attacks Realistic environment up to 15m Google Eddystone Beacons 9

  26. The "Screaming Channels" Leak Vector Idea, Root Cause, First Attack CCS 2018 [1] & BHUSA18 [2] Intuition and root cause Camurati, Poeplau, Muench, 10m in anechoic chamber Hayes, Francillon Countermeasures Systematic Analysis Data/leak coexistence TCHES 2020 Distortion, profile reuse, etc. Camurati, Francillon, Standaert Improved Attacks Realistic environment up to 15m Google Eddystone Beacons 9

  27. Some Other Interesting Cases “ LeakyNoise ” CPU to ADC side channel in mixed-signal chips CHES2019 [14] Second-Order Soft-TEMPEST Soft-TEMPEST + (un)intentional cascaded effects EMC Europe 2018 [15] AP-RASC 2019 [16] 10

  28. Let us answer some open questions about Screaming Channels 11

  29. What is the difference with conventional leakages? 1/4 12

  30. Intuitively Radio channel (data + leakage) Coupling on chip CPU TX Near-field probe 13

  31. Intuitively Radio channel (data + leakage) Coupling on chip CPU TX 1. SNR? 2. Distortion? Near-field probe 13

  32. Intuitively Radio channel (data + leakage) Coupling on chip CPU TX 3. SNR & Distortion 1. SNR? • Distance & Setup 2. Distortion? • BLE Channel 4. Data/Leakage Near-field probe modulation 5. Discrete packets 6. Frequency hopping 13

  33. Necessary Steps Before We Can Start 1. Extract traces (in the specific case of our BLE device) 1. Data (GFSK) and leakage (AM) are orthogonal 2. Trigger on a peculiar frequency 3. Fix the channel (we will consider hopping later) 4. Time diversity to deal with deep fade between packets 14

  34. Necessary Steps Before We Can Start 1. Extract traces (in the specific case of our BLE device) 1. Data (GFSK) and leakage (AM) are orthogonal 2. Trigger on a peculiar frequency 3. Fix the channel (we will consider hopping later) 4. Time diversity to deal with deep fade between packets 2. Normalize 1. Z-score normalization inspired by [3,4,5,6] 2. Per-trace normalization removes the effect of the channel! 14

  35. Necessary Steps Before We Can Start 1. Extract traces (in the specific case of our BLE device) 1. Data (GFSK) and leakage (AM) are orthogonal 2. Trigger on a peculiar frequency 3. Fix the channel (we will consider hopping later) 4. Time diversity to deal with deep fade between packets 2. Normalize 1. Z-score normalization inspired by [3,4,5,6] 2. Per-trace normalization removes the effect of the channel! 𝑧 𝑢 = 𝐻𝑦(𝑢) 𝑧−𝑏𝑤𝑕(𝑧) 𝐻𝑦−𝐻𝑏𝑤𝑕(𝑦) y’ = = = 𝑦′ 𝑡𝑢𝑒(𝑧) 𝐻𝑡𝑢𝑒(𝑦) 14

  36. Understanding the Leakage Leakage variable y = SBox(p xor k) Leakage model m(y) = HW[y] Leakage l(y) 14

  37. Understanding the Leakage Leakage variable y = SBox(p xor k) Leakage model m(y) = HW[y] model(y) Estimate (nonlinear) leakage model for each y, using the profiling set Leakage l(y) 14

  38. Understanding the Leakage Leakage variable y = SBox(p xor k) Leakage model m(y) = HW[y] model(y) Estimate (nonlinear) leakage model for each y, using the profiling set Leakage l(y) Estimate the linear correlation between m(y) and l(y) on test set 14

  39. Understanding the Leakage Leakage variable y = SBox(p xor k) Leakage model m(y) = HW[y] model(y) Estimate (nonlinear) leakage model for each y, using the profiling set Leakage l(y) This is the r-test [7] Estimate the linear correlation between m(y) and l(y) on test set 14

  40. Understanding the Leakage 15

  41. Understanding the Leakage 15

  42. Understanding the Leakage Leakage variable y = SBox(p xor k) Leakage model m(y) = HW[y] model(y) Estimate (nonlinear) leakage model for each y, using the profiling set Leakage l(y) This is the r-test [7] Estimate the linear correlation between m(y) and l(y) on test set Results for Screaming vs. Conventional • Less POIs • Slightly lower but still high correlation SNR is comparable • HW is not a good model But the leakage is distorted 16

  43. Understanding the Leakage Leakage variable y = SBox(p xor k) Leakage model m(y) = HW[y] Leakage l(y) 17

  44. Understanding the Leakage Leakage variable y = SBox(p xor k) Leakage model m(y) = HW[y] Linear combination of the bits of y Estimate a linear model of the bits Leakage l(y) of y using linear regression [7] 17

  45. Understanding the Leakage 18

  46. Understanding the Leakage 18

  47. Understanding the Leakage Leakage variable y = SBox(p xor k) Leakage model m(y) = HW[y] Linear combination of the bits of y Estimate a linear model of the bits Leakage l(y) of y using linear regression [7] Results for Screaming vs. Conventional • Confirm leakage from Sbox output • Linear model is good for conventional traces • Bad for screaming traces The leakage model is nonlinear 19

  48. Understanding the Leakage Leakage variable y Leakage model m(y) Templates [9] can capture a second order relation between m(y) and l(y) Leakage l(y) 20

  49. Understanding the Leakage Leakage variable y Leakage model m(y) Templates [9] can capture a second order relation between m(y) and l(y) Leakage l(y) Results for Screaming vs. Conventional • Templates attacks are not considerably better than profiled correlation attacks First-order leakage (for our sample size) 20

  50. Conclusion 1. Comparable SNR, distorted leakage model 2. Nonlinear leakage model 3. First order leakage Profiled Correlation Attacks 22

  51. Can we reuse the profiles? 2/4 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend