SoK: Remote Power Analysis

MacArena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review


In recent years, numerous attacks have appeared that aim to steal secret information from their victim using the power side-channel vector, yet without direct physical access. These attacks are called Remote Power Attacks or Remote Power Analysis, utilizing resources that are natively present inside the victim environment. However, there is no unified definition about the limitations that a power attack requires to be defined as remote. This paper aims to propose a unified definition and concrete threat models to clearly differentiate remote power attacks from non-remote ones. Additionally, we collect the main remote power attacks performed so far from the literature, and the principal proposed countermeasures to avoid them. The search of such countermeasures denoted a clear gap in preventing remote power attacks at the technical level. Thus, the academic community must face an important challenge to avoid this emerging threat, given the clear room for improvement that should be addressed in terms of defense and security of devices that work with private information.

Original languageEnglish
Title of host publication16th International Conference on Availability, Reliability and Security, ARES 2021
Number of pages12
ISBN (Electronic)9781450390514
Publication statusPublished - 17 Aug 2021
Publication typeA4 Article in a conference publication
EventInternational Conference on Availability, Reliability and Security -
Duration: 17 Aug 202120 Aug 2021

Publication series

NameACM International Conference Proceeding Series


ConferenceInternational Conference on Availability, Reliability and Security


  • applied cryptography
  • countermeasures
  • hardware security
  • power analysis
  • remote power analysis
  • side-channel analysis

Publication forum classification

  • Publication forum level 1

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software


Dive into the research topics of 'SoK: Remote Power Analysis'. Together they form a unique fingerprint.

Cite this