modern threat model
eg.
arduino Uno uses AES-128
AES-128 has 10 rounds of operation
using oscilloscope, able to map wave to operation
observing physical variables
side channel attacks
2 types of side channel attacks
2. timing analysis
power consumption analysis
different power consumption when running, 0s and 1s
power consumption is related to operation and algorithm
2 main techniques
- simple power analysis
- differential power analysis
simple power analysis
operation is in attacker control
protection is tamper proof
eg.
find patterns in the graph
match with numerical operation
match with instructions
Hamming weight model
eg.
when making jump –> access memory location –> semiconductor –> more power used
Differential power analysis
guesses one bit at a time
Timing analysis attack
able to guess
Timing analysis attack: keystrokes
Countermeasures for time analysis attack
switch off echo mode –> user typing can still be measured on client-side
randomise timing of keystrokes
set echo delay to be constant