TY - GEN
T1 - Attestation Waves
T2 - International Conference on Cryptology and Network Security
AU - Delgado-Lozano, Ignacio M.
AU - Martínez-Rodríguez, Macarena C.
AU - Bakas, Alexandros
AU - Brumley, Billy Bob
AU - Michalas, Antonis
N1 - Funding Information:
(i) This project has received funding from the European Research Council (ERC) under the European Union?s Horizon 2020 research and innovation programme (grant agreement No. 804476). (ii) This project has received funding by the ASCLEPIOS: Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare Project No. 826093 EU research project. (iii) Supported in part by the Cybersecurity Research Award granted by the Technology Innovation Institute (TII). (iv) Supported in part by CSIC?s i-LINK+ 2019 ?Advancing in cybersecurity technologies? (Ref. LINKA20216). (v) The first author was financially supported in part by HPY Research Foundation. (vi) M. C. Mart?nez-Rodr?guez holds a postdoc that is co-funded by European Social Fund (ESF) and the Andalusian government, through the Andalucia ESF Operational Programme 2014?2020.
Publisher Copyright:
© 2021, Springer Nature Switzerland AG.
jufoid=62555
PY - 2021
Y1 - 2021
N2 - Attestation is a strong tool to verify the integrity of an untrusted system. However, in recent years, different attacks have appeared that are able to mislead the attestation process with treacherous practices as memory copy, proxy, and rootkit attacks, just to name a few. A successful attack leads to systems that are considered trusted by a verifier system, while the prover has bypassed the challenge. To mitigate these attacks against attestation methods and protocols, some proposals have considered the use of side-channel information that can be measured externally, as it is the case of electromagnetic (EM) emanation. Nonetheless, these methods require the physical proximity of an external setup to capture the EM radiation. In this paper, we present the possibility of performing attestation by using the side-channel information captured by a sensor or peripheral that lives in the same System-on-Chip (SoC) than the processor system (PS) which executes the operation that we aim to attest, by only sharing the Power Distribution Network (PDN). In our case, an analog-to-digital converter (ADC) that captures the voltage fluctuations at its input terminal while a certain operation is taking place is suitable to characterize itself and to distinguish it from other binaries. The resultant power traces are enough to clearly identify a given operation without the requirement of physical proximity.
AB - Attestation is a strong tool to verify the integrity of an untrusted system. However, in recent years, different attacks have appeared that are able to mislead the attestation process with treacherous practices as memory copy, proxy, and rootkit attacks, just to name a few. A successful attack leads to systems that are considered trusted by a verifier system, while the prover has bypassed the challenge. To mitigate these attacks against attestation methods and protocols, some proposals have considered the use of side-channel information that can be measured externally, as it is the case of electromagnetic (EM) emanation. Nonetheless, these methods require the physical proximity of an external setup to capture the EM radiation. In this paper, we present the possibility of performing attestation by using the side-channel information captured by a sensor or peripheral that lives in the same System-on-Chip (SoC) than the processor system (PS) which executes the operation that we aim to attest, by only sharing the Power Distribution Network (PDN). In our case, an analog-to-digital converter (ADC) that captures the voltage fluctuations at its input terminal while a certain operation is taking place is suitable to characterize itself and to distinguish it from other binaries. The resultant power traces are enough to clearly identify a given operation without the requirement of physical proximity.
KW - ADC
KW - Attestation
KW - Remote power analysis
KW - Secure communications
KW - Secure protocols
KW - Side channels
U2 - 10.1007/978-3-030-92548-2_24
DO - 10.1007/978-3-030-92548-2_24
M3 - Conference contribution
AN - SCOPUS:85121934837
SN - 9783030925475
T3 - Lecture Notes in Computer Science
SP - 460
EP - 482
BT - Cryptology and Network Security - 20th International Conference, CANS 2021, Proceedings
A2 - Conti, Mauro
A2 - Stevens, Marc
A2 - Krenn, Stephan
PB - Springer
Y2 - 13 December 2021 through 15 December 2021
ER -