Abstract
On one hand, side-channel attacks are a powerful approach to cryptoanalysis, on the other hand, these attacks have a very specific attacker model. As a result, a practical application of SCA is sometimes disputable. The threat level in each case has to be evaluated given individual features of a certain target system. Endpoint client applications like mobile phone applications are especially vulnerable because of an uncomplicated access to the device. More attention has to be paid to their security since they’re more accessible to an attacker and usually carry a large amount of sensitive information.
Current research represents the informativity assessment of the side-channel signals obtained from mobile phones. Low-priced accessible equipment was used in order to decrease requirements to an attacker level and consequently increase the applicability of an attack. Logically, it results in a lack of information that can be obtained from such traces, but there are ways to achieve a good interpretation of the signal. For staying within the consumer-segment equipment, the algorithmic approach increasing traces informativity was implemented. The algorithm is Normalized Inter-Class Variance and it allows to distinctly improve the efficiency of trace analysis by reducing the number of points and increasing of the quality of reference traces.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Francis, J.G.F.: The QR transformation I. Comput. J. 4, 265–271 (1961)
Standaert, F.X.: Introduction to side-channel attacks. In: Secure Integrated Circuits and Systems, pp. 27–42 (2010)
Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO 1996, pp. 104–113 (1996)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: CRYPTO 1999, pp. 388–397
Spreitzer, R., Moonsamy, V., Korak, T., Mangard, S.: Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun. Surv. Tutorials 20(1), 465–488 (2018)
Levina, A., Borisenko, P., Mostovoy, R.: SCA as mobile security threat. In: Proceedings of the 20th Conference of Open Innovations Association FRUCT - 2017, pp. 236–241 (2017)
NACSIM 5000 Tempest Fundamentals (Report): National Security Agency, February 1982
Genkin, D., Pipman, I., Tromer, E.: Get your hands off my laptop: physical side-channel key-extraction attacks on PCs. J. Crypt. Eng. 5(2), 95–112 (2015)
Backes, M., Dürmuth, M., Gerling, S., Pinkal, M., Sporleder, C.: Acoustic side-channel attacks on printers. In: Proceedings of the 19th USENIX Conference on Security (USENIX Security’10), p. 20. USENIX Association, Berkeley, CA, USA
Genkin, D., Shamir, A., Tromer, E.: Acoustic cryptanalysis. J. Cryptol. 30(2), 392–443 (2017). https://doi.org/10.1007/s00145-015-9224-2
Yan, L., Guo, Y., Chen, X., Mei, H.: A study on power side channels on mobile devices. In: Symposium of Internetware – Internetware 2015, pp. 30–38. ACM (2015)
Gebotys, C.H., Ho, S., Tiu, C.C.: EM analysis of Rijndael and ECC on a wireless java-based PDA. In: Cryptographic Hardware and Embedded Systems – CHES 2005, ser. LNCS, vol. 3659, pp. 250–264. Springer (2005)
Goller, G., Sigl, G.: Side channel attacks on smartphones and embedded devices using standard radio equipment. In: Constructive Side-Channel Analysis and Secure Design – COSADE 2015, ser. LNCS, vol. 9064, pp. pp. 255–270. Springer (2015)
Ometov, A., Orsino, A., Andreev, S., Levina, A., Borisenko, P., Mostovoy, R.: Mobile social networking under side-channel attacks: practical security challenges. IEEE Access 5, 2591–2601 (2017)
Genkin, D., Pachmanov, L., Pipman, I., Tromer, E., Yarom, Y.: ECDSA key extraction from mobile devices via nonintrusive physical side channels. In: Conference on Computer and Communications Security – CCS 2016, pp. 1626–1638. ACM (2016)
Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: NICV: normalized inter-class variance for detection of side-channel leakage. In: IEEE International Symposium on Electromagnetic Compatibility, vol. 3, pp. 310–313. Tokyo (2013)
Bechtsoudis, A., Sklavos, N.: Side channel attacks cryptanalysis against block ciphers based on FPGA devices. In: Proceedings of IEEE Computer Society Annual Symposium on VLSI (IEEE ISVLSI’10), Kefalonia, Greece, 5–7 July 2010
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Mostovoy, R., Borisenko, P., Sleptsova, D., Levina, A., Zikratiov, I. (2019). Side-Channel Attacks on the Mobile Phones: Applicability and Improvements. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Intelligent Computing. CompCom 2019. Advances in Intelligent Systems and Computing, vol 998. Springer, Cham. https://doi.org/10.1007/978-3-030-22868-2_44
Download citation
DOI: https://doi.org/10.1007/978-3-030-22868-2_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22867-5
Online ISBN: 978-3-030-22868-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)