[PDF][PDF] Analyzing software using unintentional electromagnetic emanations from computing devices

RL Callan - 2016 - repository.gatech.edu
2016repository.gatech.edu
Previous research has thoroughly studied how program activity on computing devices can
leak sensitive information. At first such research was conducted only in secret [56], and then
publicly to address the leakage of information from CRT displays [95], and next resurged
again in the field of side channel cryptoanalysis [57]. Recent research has demonstrated that
EM emanations leak information about a very wide range of system activities and that this
leaked information might be useful for many new applications such as profiling, malware …
Previous research has thoroughly studied how program activity on computing devices can leak sensitive information. At first such research was conducted only in secret [56], and then publicly to address the leakage of information from CRT displays [95], and next resurged again in the field of side channel cryptoanalysis [57]. Recent research has demonstrated that EM emanations leak information about a very wide range of system activities and that this leaked information might be useful for many new applications such as profiling, malware detection, and debugging. These new applications differ from the typical cryptoanalysis side channel attack scenario in several ways. First, system designers employ countermeasures against side channel attacks that weaken the signal, increase noise, and weaken the link between the emanations and leaked information. In these new applications, however, the monitored system is not hostile and so no countermeasures are present, making the extraction of useful information from EM emanations less difficult. Second, the structure of information needed for the new applications is more complex and varies from application to application and from problem instance to problem instance. Side channel attacks typically attempt to extract a secret key (a set of a few hundred bits which are used repeatedly to encrypt or decrypt data), whereas the new applications attempt to extract more complex information, such as the execution path through a program. Finally, the reward for demonstrating a successful side channel attack against a single device is relatively high. In comparison, the reward for demonstrating these new applications of EM emanations on a single device and single program is lower.
repository.gatech.edu
以上显示的是最相近的搜索结果。 查看全部搜索结果