2023 Fiscal Year Annual Research Report
Security Evaluation of IoT Devices against Medium and Long-Range Side-Channel Attacks
Project/Area Number |
20K19798
|
Research Institution | The University of Electro-Communications |
Principal Investigator |
李 陽 電気通信大学, 大学院情報理工学研究科, 准教授 (20821812)
|
Project Period (FY) |
2020-04-01 – 2024-03-31
|
Keywords | side-channel attack / screaming channel / AES |
Outline of Annual Research Achievements |
Our research focused on clarifying the mechanisms underlying differences in leakage models for the screaming channel, emphasizing software and assembly code. We discovered that non-profiled attacks using the Hamming weight model could recover keys from mbedTLS but required profiling for tinyAES. The key difference between these implementations is the use of T-tables in mbedTLS versus a simple AES implementation in tinyAES. We modified tinyAES’s assembly code, particularly by relocating the S-box from flash to data RAM, and observed that this change allowed key recovery using non-profiled attacks, highlighting the influence of memory type and access frequency on leakage. Profiling on BLE Nano V2 showed significant leakage in the upper 4 bits of tinyAES’s S-box input, enabling key recovery with reduced profiling steps. Additionally, unnecessary processes in SubBytes assembly were replaced with NOP instructions, supporting the MSB4 model’s applicability. Our findings indicate that on-chip flash contributes to leakage, while off-chip flash does not show detectable leakage at 10 cm distance. In summary, our achievements include demonstrating the influence of memory placement on leakage characteristics, reducing the profiling steps needed for key recovery, and confirming the conditions under which the MSB4 model is applicable.
|