Chicken or the Egg - Computational Data Attacks or Physical Attacks

نویسندگان

  • Julien Allibert
  • Benoit Feix
  • Georges Gagnerot
  • Ismael Kane
  • Hugues Thiebeauld
  • Tiana Razafindralambo
چکیده

Side-channel and fault injection analyses are well-known domains that have been used for years to evaluate the resistance of hardware based products. These techniques remain a threat for the secret assets embedded in products like smart cards or System On Chip. But most of these products contain nowadays several strong protections rendering side-channel and fault attacks difficult or inefficient. For two decades embedded cryptography for payment, pay tv, identity areas have relied a lot on secure elements. Nowadays more alternative solutions on mobile phones appear with the aim to offer software-based security services including payment and security solutions as the HCE and DRM products. Cryptographic operations running in such applications are then executed most often on unprotected hardware devices. Therefore the binary code is often accessible to attackers who can use static and dynamic reverse engineering techniques to extract and analyse operations including data modification as faults. Hence, hiding or obfuscating secrets and/or whitebox cryptography becomes a strong alternative to secure element storage for assets. We explain in this paper how directly from the binary or with the extracted source code we can perform statistical and fault analyses using similar techniques as those used in hardware-based security. This concerns particularly side-channel or fault injections techniques. Using our tool and virtualization technique, an attacker can emulate and trace and modify any chosen computational data (memory or register manipulation, any machine language operation) executed in the mobile application. It means the attacker is not no longer restricted by any physical limitations imposing a leakage model (and additional noise) or making fault injection tied with physical limitations. Hence statistical and fault attacks can go potentially further in software-based implementation compared to hardwarebased devices. As a consequence, complex techniques like high order, collision and horizontal statistical attacks become very efficient and can be easily performed on the computational data execution traces. A similar consequence applies for fault injection attacks. Hence the word statistical and fault analysis on computational data becomes more appropriate and one can wonder who has been the first between computational data or physical attack techniques? Chicken or the Egg?

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Prevention of migraine headache attacks: enalapril or valproat sodium

The pharmacological treatment of migraine may be acute or preventive. Frequent, Severe, complicated and long lasting migraine attacks, more than 2 attacks in month require prophylaxis. Traditional preventive drugs such as ?-Blockers, antidepressants, calcium blockers and anticonvulsants, despite their documented efficacy, have many side effects. This study was conducted to determine the effect ...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

Prevention of migraine headache attacks: enalapril or valproat sodium

The pharmacological treatment of migraine may be acute or preventive. Frequent, Severe, complicated and long lasting migraine attacks, more than 2 attacks in month require prophylaxis. Traditional preventive drugs such as ?-Blockers, antidepressants, calcium blockers and anticonvulsants, despite their documented efficacy, have many side effects. This study was conducted to determine the effect ...

متن کامل

P155: Differential Diagnosis of Panic Attacks: Using a Decision Tree

Panic attacks are discrete episodes of intense fear or discomfort accompanied by symptoms such as palpitations, shortness of breath, sweating, trembling, derealization and a fear of losing control or dying. Although panic attacks are required for a diagnosis of panic disorder, they also occur in association with a host of other disorders listed in the 5h version of the diagnostic and statistica...

متن کامل

Modeling the Number of Attacks in Multiple Sclerosis Patients Using Zero-Inflated Negative Binomial Model

Background and aims: Multiple sclerosis (MS) is an inflammatory disease of the central nervous system.The impact of the number of attacks on the disease is undeniable. The aim of this study was to analyze thenumber of attacks in these patients.Methods: In this descriptive-analytical study, the registered data of 1840 MS patients referred to the MS clinicof Ayatollah Kash...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015