Side-Channel Attacks (SCAs) exploit data correla-tion in signals leaked from devices to jeopardize confidentiality. Locating and synchronizing segments of interest in traces from Cryptographic Processes (CPs) is a key step of the attack. The most common method consists in generating a trigger signal to indicate to the attacker the start of a CP. This paper proposes a method called Virtual Triggering (VT) that removes the need for the trigger signal and automates trace segmentation. When the time between repetitions is not constant, further trace alignment techniques are required. Building on VT, we propose a simple method to learn representative segment templates from a profiling device similar to the victim, and to automatically locate and pull out these segments from other victim devices using simple pattern recognition. We evaluate VT on screaming channel attacks [1], which initially used a Frequency Component (FC) known to appear at a single time in leaked signals, as a trigger to segment traces. We demonstrate that VT not only performs equivalently to FC on a standard attack scenario, but we also show how using VT with the automatic pullout technique improves the attack efficiency and enables more realistic attack scenarios. Thanks to VT, screaming channel attacks can now: (1) succeed with only half of the segments collected compared to the FC trigger from the original attack; and (2) absorb time variations between CPs.
翻译:侧声道攻击(SCAs) 利用从设备泄漏的信号中的数据corrile 来破坏保密性。 定位和同步对加密过程(CPs)的痕迹感兴趣的部分是袭击的一个关键步骤。 最常见的方法是生成触发信号,向攻击者显示CP的开始。 本文建议了一个名为虚拟触发(VT)的方法,该方法可以消除触发信号和自动断层痕量分离的需要。 当重复时间不固定时, 需要进一步的跟踪匹配技术。 在VT上, 我们提出了一个简单的方法, 以便从一个与受害者相似的剖析设备中学习具有代表性的部分模板, 并用简单的模式识别自动定位和从其他受害者装置中拉出这些部分。 我们评估了频道攻击的尖叫信号[1] 。 我们最初使用一个已知在单一时间出现在泄漏信号中的频率组件(FT) 来触发部分的痕迹。 我们证明, VT不仅在标准攻击情景下进行与FC相当的动作, 我们还展示了如何使用自动拉出去技术来从一个与受害者相似的截图样模板模板, 将快速地连接到另一个攻击的冲击段的频率变变变。 。 我们用自动拉式攻击的频率可以使VT 。