skip to main content
10.1145/3395351.3399362acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections

Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering

Published:21 July 2020Publication History

ABSTRACT

Determining which operations are being executed by a black-box device is an important challenge to tackle in reverse engineering. Furthermore, in order to perform a successful side-channel analysis (SCA) of said operations, their precise timing must be determined. In this paper, we tackle these two challenges in context of an electromagnetic (EM) analysis of a NodeMCU Amica IoT device. More specifically, we propose a convolutional neural network (CNN) architecture that is designed to classify operations performed by the NodeMCU out of a set of 8 possible operations, namely OpenSSL AES, native AES, TinyAES, OpenSSL DES, SHA1-PRF, HMAC-SHA1, SHA1, and SHA1Transform. In addition, we use the same architecture to predict the start and end times of the operation, thereby removing the need for firmware modifications or manual triggers in SCA. Our approach is evaluated using a 66 GB dataset containing 69,632 complex traces of EM leakage, captured with a USRP B210 software defined radio. The best variant of our methodology achieves a classification accuracy of 96.47%, and is able to predict the start and end times of the operation within 34 |is of the ground truth on average. We compare our methodology to classical template matching, and provide our open-source implementation and datasets to the community so that the achieved results can be reproduced.

References

  1. Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dandelion Mané, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https://www.tensorflow.org/ Software available from tensor-flow.org.Google ScholarGoogle Scholar
  2. Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, and Pankaj Rohatgi. 2003. The EM Side-Channel(s). In Cryptographic Hardware and Embedded Systems, Burton S. Kaliski, çetin K. Koç, and Christof Paar (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 29--45.Google ScholarGoogle Scholar
  3. Josep Balasch, Benedikt Gierlichs, and Ingrid Verbauwhede. 2015. Electromagnetic Circuit Fingerprints for Hardware Trojan Detection. In IEEE International Symposium on Electromagnetic Compatibility (EMC). IEEE, 246--251.Google ScholarGoogle Scholar
  4. Julien Brouchier, Tom Kean, Carol Marsh, and David Naccache. 2009. Temperature Attacks. IEEE Security & Privacy 7, 2 (2009), 79--82.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, and Aurélien Francillon. 2018. Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 163--177.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. François Chollet et al. 2015. Keras. https://keras.io.Google ScholarGoogle Scholar
  7. Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salma-sizadeh, and Mohammad T. Manzuri Shalmani. 2008. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In Advances in Cryptology - CRYPTO, David Wagner (Ed.). Springer Berlin Heidelberg, Ber6lin, Heidelberg, 203--220.Google ScholarGoogle Scholar
  8. Thomas Eisenbarth, Christof Paar, and Björn Weghenkel. 2010. Building a Side Channel Based Disassembler. In Transactions on computational science X. Springer, 78--99.Google ScholarGoogle Scholar
  9. Espressif. [n.d.]. ESP8266EX - Low-Power, Highly-Integrated Wi-Fi Solution. Retrieved February 21, 2020 from https://www.espressif.com/en/products/hardware/esp8266ex/overviewGoogle ScholarGoogle Scholar
  10. Ettus Research. [n.d.]. USRP B200/B210 Product Overview. Retrieved February 21, 2020 from https://www.ettus.com/wp-content/uploads/2019/01/b200-b210_spec_sheet.pdfGoogle ScholarGoogle Scholar
  11. Karine Gandolfi, Christophe Mourtel, and Francis Olivier. 2001. Electromagnetic Analysis: Concrete Results. In Cryptographic Hardware and Embedded Systems, Çetin K. Koç, David Naccache, and Christof Paar (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 251--261.Google ScholarGoogle Scholar
  12. Daniel Genkin, Itamar Pipman, and Eran Tromer. 2015. Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. Journal of Cryptographic Engineering 5, 2 (01 Jun 2015), 95--112. Google ScholarGoogle ScholarCross RefCross Ref
  13. Ben Hilburn et al. 2020. GNU Radio - The Free & Open Source Radio Ecosystem. GNU Radio project. https://www.gnuradio.org/Google ScholarGoogle Scholar
  14. Diederik P Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. arXiv preprint arXiv:1412.6980 (2014).Google ScholarGoogle Scholar
  15. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Annual International Cryptology Conference. Springer, 388--397.Google ScholarGoogle Scholar
  16. Paul C Kocher. 1996. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and other systems. In Annual International Cryptology Conference. Springer, 104--113.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Yann LeCun and Yoshua Bengio. 1995. Convolutional Networks for Images, Speech, and Time Series. The Handbook of Brain Theory and Neural Networks (1995), 255--258.Google ScholarGoogle Scholar
  18. Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep Learning. Nature 521, 7553 (2015), 436.Google ScholarGoogle Scholar
  19. Gaëtan Leurent and Thomas Peyrin. 2020. SHA-1 is a Shambles.Google ScholarGoogle Scholar
  20. Kevin Merchant, Shauna Revay, George Stantchev, and Bryan Nousain. 2018. Deep Learning for RF Device Fingerprinting in Cognitive Communication Networks. IEEE Journal of Selected Topics in Signal Processing 12, 1 (2018), 160--167.Google ScholarGoogle ScholarCross RefCross Ref
  21. Olivier Meynard, Denis Réal, Sylvain Guilley, Florent Flament, Jean-Luc Danger, and Frédéric Valette. 2010. Characterization of the Electromagnetic Side Channel in Frequency Domain. In International Conference on Information Security and Cryptology. Springer, 471--486.Google ScholarGoogle Scholar
  22. David P Montminy, Rusty O Baldwin, Michael A Temple, and Mark E Oxley. 2013. Differential Electromagnetic Attacks on a 32-bit Microprocessor using Software Defined Radios. IEEE Transactions on Information Forensics and Security 8, 12 (2013), 2101--2114.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Colin O'Flynn and Zhizhang David Chen. 2015. Side Channel Power Analysis of an AES-256 Bootloader. In 28th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 750--755.Google ScholarGoogle ScholarCross RefCross Ref
  24. Timothy J O'Shea, Johnathan Corgan, and T Charles Clancy. 2016. Convolutional Radio Modulation Recognition Networks. In International Conference on Engineering Applications of Neural Networks. Springer, 213--226.Google ScholarGoogle Scholar
  25. Jungmin Park, Fahim Rahman, Apostol Vassilev, Domenic Forte, and Mark Tehranipoor. 2019. Leveraging Side-Channel Information for Disassembly and Security. J. Emerg. Technol. Comput. Syst. 16, 1, Article Article 6 (Dec 2019), 21 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Stjepan Picek, Ioannis Petros Samiotis, Jaehun Kim, Annelie Heuser, Shivam Bhasin, and Axel Legay. 2018. On the Performance of Convolutional Neural Networks for Side-Channel Analysis. In International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, 157--176.Google ScholarGoogle Scholar
  27. Emmanuel Prouff, Remi Strullu, Ryad Benadjila, Eleonora Cagli, and Cécile Dumas. 2018. Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database. IACR Cryptology ePrint Archive (2018), 53. http://eprint.iacr.org/2018/053Google ScholarGoogle Scholar
  28. Jean-Jacques Quisquater and David Samyde. 2001. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. In Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security (E-SMART '01). Springer-Verlag, London, UK, UK, 200--210. http://dl.acm.org/citation.cfm?id=646803.705980Google ScholarGoogle ScholarCross RefCross Ref
  29. Joseph Redmon, Santosh Divvala, Ross Girshick, and Ali Farhadi. 2016. You Only Look Once: Unified, Real-Time Object Detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 779--788.Google ScholarGoogle ScholarCross RefCross Ref
  30. Shamnaz Riyaz, Kunal Sankhe, Stratis Ioannidis, and Kaushik Chowdhury. 2018. Deep Learning Convolutional Neural Networks for Radio Identification. IEEE Communications Magazine 56, 9 (2018), 146--152.Google ScholarGoogle ScholarCross RefCross Ref
  31. Asanka Sayakkara, Nhien-An Le-Khac, and Mark Scanlon. 2019. Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices. Digital Investigation 29 (2019), S94--S103.Google ScholarGoogle ScholarCross RefCross Ref
  32. Adi Shamir and Eran Tromer. 2004. Acoustic Cryptanalysis. Presentation available from http://www.wisdom.weizmann.ac.il/~tromer (2004).Google ScholarGoogle Scholar
  33. Karen Simonyan and Andrew Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. arXiv preprint arXiv:1409.1556 (2014).Google ScholarGoogle Scholar
  34. Barron D Stone and Samuel J Stone. 2015. Radio Frequency Based Reverse Engineering of Microcontroller Program Execution. In National Aerospace and Electronics Conference (NAECON). IEEE, 159--164.Google ScholarGoogle Scholar
  35. The NodeMCU firmware contributors. 2020. NodeMCU-firmware - Lua-based Interactive Firmware for ESP8266, ESP8285 and ESP32. NodeMCU. https://github.com/nodemcu/nodemcu-firmwareGoogle ScholarGoogle Scholar
  36. C Tiu. 2005. A New Frequency-Based Side Channel Attack for Embedded Systems. Master's thesis. University of Waterloo.Google ScholarGoogle Scholar
  37. Aäron van den Oord, Sander Dieleman, Heiga Zen, Karen Simonyan, Oriol Vinyals, Alex Graves, Nal Kalchbrenner, Andrew Senior, and Koray Kavukcuoglu. 2016. WaveNet: A Generative Model for Raw Audio. In 9th ISCA Speech Synthesis Workshop. 125--125.Google ScholarGoogle Scholar
  38. Guang Yang, Huizhong Li, Jingdian Ming, and Yongbin Zhou. 2018. Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations. In International Conference on Smart Card Research and Advanced Applications. Springer, 1--17.Google ScholarGoogle Scholar
  39. YongBin Zhou and DengGuo Feng. 2005. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing. IACR Cryptology ePrint Archive (2005), 388.Google ScholarGoogle Scholar
  40. Yuanyuan Zhou and François-Xavier Standaert. 2019. Deep Learning Mitigates But Does Not Annihilate the Need of Aligned Traces and a Generalized ResNet Model for Side-Channel Attacks. Journal of Cryptographic Engineering (2019), 1--11.Google ScholarGoogle Scholar

Index Terms

  1. Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WiSec '20: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
          July 2020
          366 pages
          ISBN:9781450380065
          DOI:10.1145/3395351

          Copyright © 2020 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 July 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate98of338submissions,29%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader