Attestation is a strong tool to verify the integrity of an untrusted system. However, in recent years, different attacks have appeared that are able to mislead the attestation process with treacherous practices as memory copy, proxy and rootkit attacks, just to name a few. A successful attack leads to systems that are considered trusted by a verifier system, while the prover has bypassed the challenge. To harden these attacks against attestation methods and protocols, some proposals have considered the use of side-channel information that can be measured externally, as it is the case of electromagnetic (EM) emanation. Nonetheless, these methods require the physical proximity of an external setup to capture the EM radiation. In this paper, we present the possibility of performing attestation by using the side channel information captured by a sensor or peripheral that lives in the same System-on-Chip (SoC) than the processor system (PS) which executes the operation that we aim to attest, by only sharing the Power Distribution Network (PDN). In our case, an analog-to-digital converter (ADC) that captures the voltage fluctuations at its input terminal while a certain operation is taking place is suitable to characterize itself and to distinguish it from other binaries. The resultant power traces are enough to clearly identify a given operation without the requirement of physical proximity.
翻译:然而,近年来,各种袭击似乎都能够误导验证过程,其方法包括记忆复制、代理和根基特攻击等背信弃义的做法。成功的袭击导致一个被验证者系统信任的系统,而验证者却绕过了挑战。为了对这些攻击加以强化,以证明方法和协议为据,一些提案考虑了如何使用可以外部测量的侧通道信息,电磁(EM)电磁(EM)处理。然而,这些方法要求外部装置实际接近外部装置,以捕捉EM辐射。在本文件中,我们提出有可能通过使用一个传感器或外围装置所捕捉的旁通道信息进行验证,该传感器或外围装置住在同一系统(SOC)中,而处理器系统(PS)则执行我们想要证明的操作,仅分享电源分配网络(PDN)。就我们而言,一个模拟数字转换器(ADC)需要从外部装置实际定位电磁辐射辐射,而没有将电流的电流定位到其他终端结果。在特定终端上,一个固定的电流流流到另一个终端结果就是明确识别其电流流流流流流流流到其他结果。