[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/648255.752713guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The EM Side-Channel(s)

Published: 13 August 2002 Publication History

Abstract

We present results of a systematic investigation of leakage of compromising information via electromagnetic (EM) emanations from CMOS devices. These emanations are shown to consist of a multiplicity of signals, each leaking somewhat different information about the underlying computation. We show that not only can EM emanations be used to attack cryptographic devices where the power side-channel is unavailable, they can even be used to break power analysis countermeasures.

References

[1]
D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi, EM Side-Channel(s): Attacks and Assessment Methodologies, http://www.research.ibm.com/intsec.
[2]
S. Chari, C. S. Jutla, J. R. Rao and P. Rohatgi. Towards Sound Countermeasures to Counteract Power-Analysis Attacks. Proc CRYPTO '99, LNCS 1666, pp 398-412.
[3]
S. Chari, J. R. Rao and P. Rohatgi. Template Attacks, Proc CHES '02.
[4]
L. Goubin and J. Patarin. DES and Differential Power Analysis. Proc CHES '99, LNCS 1717, pp 158-172.
[5]
NSA Tempest Series http://cryptome.org/#NSA--TS.
[6]
K. Gandolfi, C. Mourtel and F. Olivier. Electromagnetic Attacks: Concrete Results. Proc CHES '01, LNCS 2162, pp 251-261.
[7]
P. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other Systems. Proc CRYPTO '96, LNCS 1109, pp 104-113.
[8]
P. Kocher, J. Jaffe and B. Jun. Differential Power Analysis: Leaking Secrets. Proc CRYPTO '99, LNCS 1666, pp 388-397.
[9]
J.-J. Quisquater and D. Samyde. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In Smart Card Programming and Security (E-smart 2001), LNCS 2140, pp. 200-210.
[10]
The complete unofficial TEMPEST web page, http://www.eskimo.com/~joelm/tempest.html.

Cited By

View all
  • (2021)SpecSafe: detecting cache side channels in a speculative worldProceedings of the ACM on Programming Languages10.1145/34855065:OOPSLA(1-28)Online publication date: 15-Oct-2021
  • (2021)EM-X-DL: Efficient Cross-device Deep Learning Side-channel Attack With Noisy EM SignaturesACM Journal on Emerging Technologies in Computing Systems10.1145/346538018:1(1-17)Online publication date: 29-Sep-2021
  • (2021)Advanced Far Field EM Side-Channel Attack on AESProceedings of the 7th ACM on Cyber-Physical System Security Workshop10.1145/3457339.3457982(29-39)Online publication date: 24-May-2021
  • Show More Cited By
  1. The EM Side-Channel(s)

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
    August 2002
    609 pages

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 13 August 2002

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 04 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)SpecSafe: detecting cache side channels in a speculative worldProceedings of the ACM on Programming Languages10.1145/34855065:OOPSLA(1-28)Online publication date: 15-Oct-2021
    • (2021)EM-X-DL: Efficient Cross-device Deep Learning Side-channel Attack With Noisy EM SignaturesACM Journal on Emerging Technologies in Computing Systems10.1145/346538018:1(1-17)Online publication date: 29-Sep-2021
    • (2021)Advanced Far Field EM Side-Channel Attack on AESProceedings of the 7th ACM on Cyber-Physical System Security Workshop10.1145/3457339.3457982(29-39)Online publication date: 24-May-2021
    • (2021)Improving Deep Learning Networks for Profiled Side-channel Analysis Using Performance Improvement TechniquesACM Journal on Emerging Technologies in Computing Systems10.1145/345316217:3(1-30)Online publication date: 30-Jun-2021
    • (2021)Ghost ThreadProceedings of the Eleventh ACM Conference on Data and Application Security and Privacy10.1145/3422337.3447846(233-244)Online publication date: 26-Apr-2021
    • (2021)AbacusProceedings of the 43rd International Conference on Software Engineering10.1109/ICSE43902.2021.00078(797-809)Online publication date: 22-May-2021
    • (2019)Light EarsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/33512563:3(1-27)Online publication date: 9-Sep-2019
    • (2019)Mitigating Electrical-level Attacks towards Secure Multi-Tenant FPGAs in the CloudACM Transactions on Reconfigurable Technology and Systems10.1145/332822212:3(1-26)Online publication date: 13-Aug-2019
    • (2019)H-ORAMProceedings of the 56th Annual Design Automation Conference 201910.1145/3316781.3317841(1-6)Online publication date: 2-Jun-2019
    • (2019)Secure and Efficient Initialization and Authentication Protocols for SHIELDIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2017.264795016:1(156-173)Online publication date: 1-Jan-2019
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media