Side channel attacks on smartphones and embedded devices using standard radio equipment

Gabriel Goller, Georg Sigl

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

29 Scopus citations

Abstract

Side Channel Attacks are a powerful instrument to break cryptographic algorithms by measuring physical quantities during the execution of these algorithms on electronic devices. In this paper, the electromagnetic emanations of smartphones and embedded devices will be used to extract secret keys of public key cryptosystems. This will be done using standard radio equipment in combination with far-field antennas. While such attacks have been shown previously, the details of how to find relevant emanations and the limits of the attack remain largely unknown. Therefore, this paper will present all the required steps to find emanations of devices, implement a side channel attack exploiting ultra high frequency emanations and discuss different test setups. The result is a test setup which enables an attacker to mount a side channel attack for less than 30 Euros.

Original languageEnglish
Title of host publicationConstructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Revised Selected Papers
EditorsStefan Mangard, Axel Y. Poschmann
PublisherSpringer Verlag
Pages255-270
Number of pages16
ISBN (Print)9783319214757
DOIs
StatePublished - 2015
Event6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015 - Berlin, Germany
Duration: 13 Apr 201514 Apr 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9064
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2015
Country/TerritoryGermany
CityBerlin
Period13/04/1514/04/15

Fingerprint

Dive into the research topics of 'Side channel attacks on smartphones and embedded devices using standard radio equipment'. Together they form a unique fingerprint.

Cite this