Ecole d'ingénieur et centre de recherche en Sciences du numérique

Screaming channels: When electromagnetic side channels meet radio transceivers

Camurati, Giovanni; Poeplau, Sebastian; Muench, Marius; Hayes, Tom; Francillon, Aurélien

CCS 2018, 25th ACM conference on Computer and communications security, 15-19 October 2018, Toronto, Canada

3rd place at the CSAW18 competition

This paper presents a new side channel that affects mixed-signal chips used in widespread wireless communication protocols, such as Bluetooth and WiFi. This increasingly common type of chip includes the radio transceiver along with digital logic on the same integrated circuit. In such systems, the radio transmitter may unintentionally broadcast sensitive information from hardware cryptographic components or software executing on the CPU. The wellknown electromagnetic (EM) leakage from digital logic is inadvertently mixed with the radio carrier, which is amplified and then transmitted by the antenna. We call the resulting leak "screaming channels". Attacks exploiting such a side channel may succeed over a much longer distance than attacks exploiting usual EM side channels. The root of the problem is that mixed-signal chips include both digital circuits and analog circuits on the same silicon die in close physical proximity. While processing data, the digital circuits on these chips generate noise, which can be picked up by noise-sensitive analog radio components, ultimately leading to leakage of sensitive information. We investigate the physical reasons behind the channel, we measure it on several popular devices from different vendors (including Nordic Semiconductor nRF52832, and Qualcomm Atheros AR9271), and we demonstrate a complete key recovery attack against the nRF52832 chip. In particular, we retrieve the full key from the AES-128 implementation in tinyAES at a distance of 10 m using template attacks. Additionally, we recover the key used by the AES-128 implementation in mbedTLS at a distance of 1 m with a correlation attack. Screaming channel attacks change the threat models of devices with mixed-signal chips, as those devices are now vulnerable from a distance. More specifically, we argue that protections against side channels (such as masking or hiding) need to be used on this class of devices. Finally, chips implementing other widespread protocols (e.g., 4G/LTE, RFID) need to be inspected to determine whether they are vulnerable to screaming channel attacks.

Document Doi Bibtex

Titre:Screaming channels: When electromagnetic side channels meet radio transceivers
Type:Conférence
Langue:English
Ville:Toronto
Pays:CANADA
Date:
Département:Sécurité numérique
Eurecom ref:5625
Copyright: © ACM, 2018. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in CCS 2018, 25th ACM conference on Computer and communications security, 15-19 October 2018, Toronto, Canada http://dx.doi.org/10.1145/3243734.3243802
Bibtex: @inproceedings{EURECOM+5625, doi = {http://dx.doi.org/10.1145/3243734.3243802}, year = {2018}, title = {{S}creaming channels: {W}hen electromagnetic side channels meet radio transceivers}, author = {{C}amurati, {G}iovanni and {P}oeplau, {S}ebastian and {M}uench, {M}arius and {H}ayes, {T}om and {F}rancillon, {A}ur{\'e}lien}, booktitle = {{CCS} 2018, 25th {ACM} conference on {C}omputer and communications security, 15-19 {O}ctober 2018, {T}oronto, {C}anada}, address = {{T}oronto, {CANADA}}, month = {10}, url = {http://www.eurecom.fr/publication/5625} }
Voir aussi: