Skip to main content

Side-Channel Attacks on the Mobile Phones: Applicability and Improvements

  • Conference paper
  • First Online:
Intelligent Computing (CompCom 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 998))

Included in the following conference series:

  • 1654 Accesses

Abstract

On one hand, side-channel attacks are a powerful approach to cryptoanalysis, on the other hand, these attacks have a very specific attacker model. As a result, a practical application of SCA is sometimes disputable. The threat level in each case has to be evaluated given individual features of a certain target system. Endpoint client applications like mobile phone applications are especially vulnerable because of an uncomplicated access to the device. More attention has to be paid to their security since they’re more accessible to an attacker and usually carry a large amount of sensitive information.

Current research represents the informativity assessment of the side-channel signals obtained from mobile phones. Low-priced accessible equipment was used in order to decrease requirements to an attacker level and consequently increase the applicability of an attack. Logically, it results in a lack of information that can be obtained from such traces, but there are ways to achieve a good interpretation of the signal. For staying within the consumer-segment equipment, the algorithmic approach increasing traces informativity was implemented. The algorithm is Normalized Inter-Class Variance and it allows to distinctly improve the efficiency of trace analysis by reducing the number of points and increasing of the quality of reference traces.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Francis, J.G.F.: The QR transformation I. Comput. J. 4, 265–271 (1961)

    Article  MathSciNet  Google Scholar 

  2. Standaert, F.X.: Introduction to side-channel attacks. In: Secure Integrated Circuits and Systems, pp. 27–42 (2010)

    Google Scholar 

  3. Kocher, P.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO 1996, pp. 104–113 (1996)

    Chapter  Google Scholar 

  4. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: CRYPTO 1999, pp. 388–397

    Chapter  Google Scholar 

  5. Spreitzer, R., Moonsamy, V., Korak, T., Mangard, S.: Systematic classification of side-channel attacks: a case study for mobile devices. IEEE Commun. Surv. Tutorials 20(1), 465–488 (2018)

    Article  Google Scholar 

  6. Levina, A., Borisenko, P., Mostovoy, R.: SCA as mobile security threat. In: Proceedings of the 20th Conference of Open Innovations Association FRUCT - 2017, pp. 236–241 (2017)

    Google Scholar 

  7. NACSIM 5000 Tempest Fundamentals (Report): National Security Agency, February 1982

    Google Scholar 

  8. Genkin, D., Pipman, I., Tromer, E.: Get your hands off my laptop: physical side-channel key-extraction attacks on PCs. J. Crypt. Eng. 5(2), 95–112 (2015)

    Article  Google Scholar 

  9. Backes, M., Dürmuth, M., Gerling, S., Pinkal, M., Sporleder, C.: Acoustic side-channel attacks on printers. In: Proceedings of the 19th USENIX Conference on Security (USENIX Security’10), p. 20. USENIX Association, Berkeley, CA, USA

    Google Scholar 

  10. Genkin, D., Shamir, A., Tromer, E.: Acoustic cryptanalysis. J. Cryptol. 30(2), 392–443 (2017). https://doi.org/10.1007/s00145-015-9224-2

    Article  MATH  Google Scholar 

  11. Yan, L., Guo, Y., Chen, X., Mei, H.: A study on power side channels on mobile devices. In: Symposium of Internetware – Internetware 2015, pp. 30–38. ACM (2015)

    Google Scholar 

  12. Gebotys, C.H., Ho, S., Tiu, C.C.: EM analysis of Rijndael and ECC on a wireless java-based PDA. In: Cryptographic Hardware and Embedded Systems – CHES 2005, ser. LNCS, vol. 3659, pp. 250–264. Springer (2005)

    Google Scholar 

  13. Goller, G., Sigl, G.: Side channel attacks on smartphones and embedded devices using standard radio equipment. In: Constructive Side-Channel Analysis and Secure Design – COSADE 2015, ser. LNCS, vol. 9064, pp. pp. 255–270. Springer (2015)

    Google Scholar 

  14. Ometov, A., Orsino, A., Andreev, S., Levina, A., Borisenko, P., Mostovoy, R.: Mobile social networking under side-channel attacks: practical security challenges. IEEE Access 5, 2591–2601 (2017)

    Article  Google Scholar 

  15. Genkin, D., Pachmanov, L., Pipman, I., Tromer, E., Yarom, Y.: ECDSA key extraction from mobile devices via nonintrusive physical side channels. In: Conference on Computer and Communications Security – CCS 2016, pp. 1626–1638. ACM (2016)

    Google Scholar 

  16. Bhasin, S., Danger, J.-L., Guilley, S., Najm, Z.: NICV: normalized inter-class variance for detection of side-channel leakage. In: IEEE International Symposium on Electromagnetic Compatibility, vol. 3, pp. 310–313. Tokyo (2013)

    Google Scholar 

  17. Bechtsoudis, A., Sklavos, N.: Side channel attacks cryptanalysis against block ciphers based on FPGA devices. In: Proceedings of IEEE Computer Society Annual Symposium on VLSI (IEEE ISVLSI’10), Kefalonia, Greece, 5–7 July 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alla Levina .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mostovoy, R., Borisenko, P., Sleptsova, D., Levina, A., Zikratiov, I. (2019). Side-Channel Attacks on the Mobile Phones: Applicability and Improvements. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Intelligent Computing. CompCom 2019. Advances in Intelligent Systems and Computing, vol 998. Springer, Cham. https://doi.org/10.1007/978-3-030-22868-2_44

Download citation

Publish with us

Policies and ethics