lectures.alex.balgavy.eu

Lecture notes from university.
git clone git://git.alex.balgavy.eu/lectures.alex.balgavy.eu.git
Log | Files | Refs | Submodules

side-channel-analysis-fault-injection.md (1657B)


      1 +++
      2 title = 'Side Channel Analysis & Fault Injection'
      3 +++
      4 
      5 # Side Channel Analysis & Fault Injection
      6 ## Side channel analysis
      7 An attacker with physical access can use the device side effects to leak sensitive info.
      8 
      9 ### Power side channel analysis
     10 Computation works using transistors, so we can see based on changing power what's happening.
     11 
     12 Measuring power trace: PC communicates with target and oscilloscope, which measures power usage on the target.
     13 Put a shunt resistor between power supply to pin of chip that it uses to power up, and measure voltage across the resistor.
     14 
     15 Alternative: electromagnetic probes, no physical modifications needed, but not as accurate measurement. Another advantage, can be placed above parts of a chip that you want to monitor.
     16 
     17 Simple power analysis: comparing power consumption on success/fail.
     18 
     19 Power consumption is proportional to the number of transistors switching.
     20 Power consumption is proportional to the hamming weight of processed data.
     21 - Hamming weight: number of bits set to 1 in a number.
     22 
     23 E.g. to attack AES, you can guess some key bytes, and then compute the correlation between the guessed Sbox output's hamming weight and the power trace samples. Only one will always correlate, leaking the secret key byte.
     24 - but need to ensure power traces are aligned
     25 
     26 ## Fault injection
     27 An attacker with physical access can disrupt operating conditions to bypass security checks.
     28 
     29 All chips require specific conditions to work correctly (e.g. voltage), and if you don't respect them, you get glitches.
     30 
     31 Many different ways to glitch: clock fault injection, electromagnetic fault injection, lasers, physical probing...