screaming ch channels
play

Screaming Ch Channels When Electromagnetic Side Channels Meet Radio - PowerPoint PPT Presentation

Screaming Ch Channels When Electromagnetic Side Channels Meet Radio Transceivers Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurlien Francillon Whats this all about? - A nov novel attack ex exploiting g EM side


  1. Screaming Ch Channels When Electromagnetic Side Channels Meet Radio Transceivers Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon

  2. What’s this all about? - A nov novel attack ex exploiting g EM side cha channels from om a di distance - A A PoC oC implementation on up up to 10m 0m di dist stance (with dem demo!) - Wher Where to go o from om he here?

  3. Let’s start from the beginning

  4. Leaks in rad adio io si signals AES128(K,P)

  5. Agenda From the state of the art to a novel attack

  6. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  7. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  8. Side channel bas asic ics • Even provably secure cryptography may be broken if some intermediate computations are visible • Physical implementations may leak intermediate data • Attackers observe the leaks and reconstruct cryptographic secrets

  9. Side channel bas asic ics ChipWhisperer! https://wiki.newae.com/File:Cw1173_microusb.jpg

  10. El Elect ctromagnetic ic Side-Channel els • Data-dependent EM leaks occur because: • Digital logic consumes current when switching • Current variations generate EM emissions • Similar to power side-channels • Known attacks: Kasper et al. [1] Genkin et al. [2] TEMPEST [3] Distance

  11. Correla latio ion attack ck basic sics • An intuitive attack, there are many more • Ingredients: • Known Plaintext } Leak model • State non-linear in Plaintext and Key • Leak linear in the State K Leak P State

  12. Correla latio ion attack ck basic sics • Recipe: 1. Encrypt many times and measure the Leaks 2. Guess a byte of the Key and compute the States 3. Check if the Measurements correlate with the Computations 4. Repeat for each byte of the key K Measured Computed P

  13. Correla latio ion attack ck basic sics • Recipe: 𝑔𝑝𝑠 𝒄𝒛𝒖𝒇 𝑗𝑜 𝒍𝒇𝒛: 𝑔𝑝𝑠 𝒉𝒗𝒇𝒕𝒕 𝑗𝑜 𝟏 𝑢𝑝 𝟑𝟔𝟔: 1. Encrypt many times and measure the Leaks 𝑠𝑏𝑜𝑙𝑡[𝑕𝑣𝑓𝑡𝑡] = 𝑑𝑝𝑠𝑠𝑓𝑚𝑏𝑢𝑗𝑝𝑜(𝑚𝑓𝑏𝑙, 𝑕𝑣𝑓𝑡𝑡) 2. Guess a byte of the Key and the corresponding States 𝑕𝑣𝑓𝑡𝑡 𝑐𝑓𝑡𝑢 [𝑐𝑧𝑢𝑓] = 𝑏𝑠𝑕𝑛𝑏𝑦(𝑠𝑏𝑜𝑙𝑡) 3. The guess is right iff the Leaks are linear with the States 4. Repeat for each byte of the key K Leak P State

  14. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - The Hypothesis - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  15. A Simple Wave 1.25 λ 1 Amplitude 0.75 a 0.5 0.25 0 -0.25 -0.5 c -0.75 -1 -1.25 Distance

  16. A Simple Wave 1.25 λ Spectrum 1 Power Amplitude 0.75 a 0.5 0.25 0 f Frequency -0.25 -0.5 c -0.75 -1 -1.25 Distance

  17. Mo Modula lation Basics sics Information Amplitude Carrier AM Signal Time

  18. Mo Modula lation Basics sics Information Amplitude Spectrum Power Carrier f c +f i f c -f i f c AM Signal Time

  19. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  20. Mi Mixed ed-sig ignal l chip ips • Examples • Look around… • BT, WiFi, GPS, etc. • Idea • Combine digital processor and analog radio on a single chip • Integrate the two and provide an easy interface to the outside • Benefits • Cheap • Small • Power efficient • Nice for developers

  21. A big proble lem: Noise • Digital logic produces noise • Close physical proximity facilitates noise propagation • Analog radio is sensitive to noise • Designers care about functionality

  22. Wha What t if di digit ital l no nois ise e wi with th sensit itiv ive inf nform rmatio tion lea eaks s into the he ra radio o signal?

  23. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  24. So the journey y begin ins...

  25. Di Disc scover ery of a leak • After months of trying: • Multiple chips • Custom firmware • One day: • Accidental tuning on "wrong" frequency • A leak dependent on our computations • So the investigation started

  26. Di Disc scover ery of a leak Simple Firmware: P - TX off/on (CW) - Slow loop/fast loop - Controlled via UART f Software Mixed-signal 2.4 GHz Defined Radio chip

  27. Di Disc scover ery of a leak P f Software Mixed-signal Defined Radio chip

  28. Di Disc scover ery of a leak P - Slow loop - TX off - Close distance f Spectrum 64 MHz Mixed-signal Analyzer chip

  29. Di Disc scover ery of a leak P - Fast loop - TX off - Close distance f Spectrum 64 MHz Mixed-signal Analyzer chip

  30. Di Disc scover ery of a leak P - Slow loop - TX on f Spectrum 64 MHz Mixed-signal 2.4 GHz Analyzer chip

  31. Di Disc scover ery of a leak P - Fast loop - TX on f Spectrum 64 MHz Mixed-signal 2.4 GHz Analyzer chip

  32. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  33. Logic ic Transmiss ssio ion Scheme P f 64 MHz 2.4 GHz 64 MHz Digital noise Radio Clock BT Carrier (64MHz) (2.4GHz)

  34. Conventio ional P • Current consumption • Mixing f 64 MHz Digital noise Clock (64MHz)

  35. Conventio ional 𝑾 𝑻𝒗𝒒𝒒𝒎𝒛 • Current consumption 𝑱 • Dependent on 𝑾 𝒋𝒐 𝑾 𝒑𝒗𝒖 transitions of logic values 𝑫 𝑸𝒃𝒔𝒃𝒕𝒋𝒖𝒋𝒅 • Mixing 𝑯𝒐𝒆 𝑱 t 𝑾 𝒑𝒗𝒖 : 𝟏 → 𝟐

  36. Conventio ional 𝑾 𝑻𝒗𝒒𝒒𝒎𝒛 • Current consumption 𝑱 • Dependent on 𝑾 𝒋𝒐 𝑾 𝒑𝒗𝒖 transitions of logic values 𝑫 𝑸𝒃𝒔𝒃𝒕𝒋𝒖𝒋𝒅 • Mixing 𝑯𝒐𝒆 𝑱 t 𝑾 𝒑𝒗𝒖 : 𝟐 → 𝟏 𝑾 𝒑𝒗𝒖 : 𝟏 → 𝟐

  37. Conventio ional • Current consumption 𝑬𝒃𝒖𝒃 𝒎𝒋𝒐𝒇 • Dependent on transitions of logic values • Mixing 𝑫𝒎𝒍 • Clock • 1: “direct” Carrier Modulation

  38. Conventio ional • Current consumption • Dependent on transitions of logic 𝑱 𝒕𝒃𝒖 = α( 𝑾 𝟐 + 𝑾 𝟑 − 𝑾 𝒖𝒊 ) 𝟑 = values = 𝑾 𝟐 + 𝑾 𝟑 • Mixing 𝟑 𝑾 𝟐 × 𝑾 𝟑 + 𝒇𝒖𝒅. • Clock • 1: “direct” nMOS transistor • 2: non-linear in saturation components

  39. Screa eaming Channels ls P • Digital to Analog propagation • Mixing f 64 MHz 2.4 GHz 64 MHz Digital noise Radio Clock BT Carrier (64MHz) (2.4GHz)

  40. Screa eaming Channels ls 𝑾 𝑻𝒗𝒒𝒒𝒎𝒛 P • Digital to Analog propagation • 1: Substrate Coupling • Same silicon die • 2: Power Supply Coupling f 64 MHz • Same power supply • Mixing Digital noise Digital Analog Clock Substrate (64MHz)

  41. Screa eaming Channels ls Noise from the P • Digital to Analog propagation digital domain 1. Substrate Coupling I • Same silicon die 2. Power Supply Coupling f 64 MHz • Same power supply 𝟏° • Mixing PA VCO Digital noise 𝟘𝟏° 1. Voltage Controlled Oscillator 2. Power Amplifier Q DAC 3. etc. Clock (64MHz) (Analog) TX

  42. Summing Up Generation "Spectrum Spraying" Propagation Radio Transmission

  43. Agen enda Introduction Part I Part II Part III Background Our Story Towards an attack - EM Side-Channels - Discovery of the leak - Building the attack - RF communications 101 - Explanation - Demo - Noise in mixed-signal ICs Conclusion

  44. AES in the e sp spec ectrogram Radio On AES On Radio Off

  45. AES in the e sp spec ectrogram Radio On AES On Radio Off

  46. AES in the e sp spec ectrogram Radio On AES On Radio Off

  47. AES in the e sp spec ectrogram Radio On AES On Radio Off

  48. AES in the e sp spec ectrogram Radio On AES On Radio Off

  49. AES in the e sp spec ectrogram Radio On AES On Radio Off

  50. Ex Extract ctio ion and alignmen ent Packets Trigger Frequency

  51. Ex Extract ctio ion and alignmen ent Self-correlation alignment Average

Recommend


More recommend