Authors:
Julien Maillard
1
;
2
;
Thomas Hiscock
1
;
Maxime Lecomte
1
and
Christophe Clavier
2
Affiliations:
1
Univ. Grenoble Alpes, CEA-LETI, Minatec Campus, f-38054 Grenoble, France
;
2
Univ. Limoges, XLIM-MATHIS, Limoges, France
Keyword(s):
Side-Channel Attack, Micro-Architectural Attack, TrustZone, System-on-Chip.
Abstract:
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observable from
software measurements. So far, the analysis of micro-architectural leakages over physical side-channels
(power consumption, electromagnetic field) received little treatment. In this paper, we argue that those attacks are a serious threat, especially against systems such as smartphones and Internet-of-Things (IoT) devices
which are physically exposed to the end-user. Namely, we show that the observation of Dynamic Random
Access Memory (DRAM) accesses with an electromagnetic (EM) probe constitutes a reliable alternative to
time measurements in cache side-channel attacks. We describe the EVICT+EM attack, that allows recovering a full AES key on a T-Tables implementation with similar number of encryptions than state-of-the-art
EVICT+RELOAD attacks on the studied ARM platforms. This new attack paradigm removes the need for
shared memory and exploits EM radiations instead of hi
gh precision timers. Then, we introduce PRIME+EM,
which goal is to reverse-engineer cache usage patterns of applications. This attack allows to recover the layout
of lookup tables within the cache. Finally, we present COLLISION+EM, a collision-based attack on a Systemon-chip (SoC) that does not require malicious code execution, and show its practical efficiency in recovering
key material on an ARM TrustZone application. Those results show that physical observation of the microarchitecture can lead to improved attacks.
(More)