DOI QR코드

DOI QR Code

Side-Channel Attacks Detection Methods: A Survey

  • Assaeedi, Joanna (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University) ;
  • Alsuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
  • Received : 2022.06.05
  • Published : 2022.06.30

Abstract

Side-channel attacks are a quiet mighty type of attack that targets specific physical implementations vulnerabilities. Even though several researchers have examined diverse means and methods of detecting side-channel attacks, at the present time a systematic review of these approaches does not exist. The purposes of this paper are to give an extensive analysis of literature on side-channel attack detection and offer intuitiveness from past research studies. In this study, a literature survey is conducted on articles related to side-channel attack detection between 2020 and 2022 from ACM and IEEE digital libraries. From the 10 publications included in the study, it appears they target either a single type of side-channel attacks or multiple types of side-channel attacks. Therefore, a vital review of each of the two categories is provided, as well as possible prospective research in this field of study.

Keywords

References

  1. Merriam-Webster. (n.d.). Cryptography definition & meaning. Retrieved March 12, 2022, from https://www.merriam-webster.com/dictionary/cryptography.
  2. Randolph, M., & Diehl, W. (2020). Power side-channel attack analysis: A review of 20 years of study for the layman. Cryptography, 4 (2), 15. https://doi.org/10.3390/cryptography4020015
  3. Joy Persial, G., Prabhu, M., & Shanmugalakshmi, R. (2011). Side channel attack-survey. Int J Adva Sci Res Rev, 1(4), 54-57.
  4. Wang, H., Sayadi, H., Rafatirad, S., Sasan, A., & Homayoun, H. (2020). Scarf: Detecting side-channel attacks at real-time using low-level hardware features. In 2020 ieee 26th international symposium on on-line testing and robust system design (iolts) (pp. 1-6).
  5. Verbauwhede, I. M. (2010). Secure integrated circuits and systems. Springer.
  6. Okeya, K., & Sakurai, K. (2003). A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks. In Proceedings 2003 ieee information theory workshop (cat. no. 03ex674) (pp. 175-178).
  7. Rahaman, M. Z., & Hossain, M. A. (2008). Side channel attack prevention for aes smart card. In 2008 11th international conference on computer and information technology (pp. 376-380).
  8. Kocher, P. C. (1996). Timing attacks on implementations of diffiehellman, rsa, dss, and other systems. In Annual international cryptology conference (pp. 104-113).
  9. Lawson, N. (2009). Side-channel attacks on cryptographic software. IEEE Security & Privacy, 7(6), 65-68. https://doi.org/10.1109/MSP.2009.165
  10. Fan, J., Guo, X., De Mulder, E., Schaumont, P., Preneel, B., & Verbauwhede, I. (2010). State-of-the-art of secure ecc implementations: a survey on known side-channel attacks and countermeasures. In 2010 ieee international symposium on hardware-oriented security and trust (host) (pp. 76-87).
  11. Quisquater, J.-J., & Koene, F. (2009). Side channel attacks: State of the art, october 2002. Available from http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1047 Side Channel report. pdf.
  12. Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Annual international cryptology conference (pp. 388-397).
  13. Sayakkara, A., Le-Khac, N.-A., & Scanlon, M. (2019). A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digital Investigation, 29, 43-54. https://doi.org/10.1016/j.diin.2019.03.002
  14. Getz, R., & Moeckel, B. (1996). Understanding and eliminating emi in microcontroller applications. National Semiconductor.
  15. Sayakkara, A., Le-Khac, N.-A., & Scanlon, M. (2018). Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis. In Companion proceedings for the issta/ecoop 2018 workshops (pp.138-143).
  16. Pongaliur, K., Abraham, Z., Liu, A. X., Xiao, L., & Kempel, L. (2008). Securing sensor nodes against side channel attacks. In 2008 11th ieee high assurance systems engineering symposium (pp. 353-361).
  17. Moher, D., Liberati, A., Tetzlaff, J., Altman, D. G., & Group*, P. (2009). Preferred reporting items for systematic reviews and meta-analyses: the prisma statement. Annals of internal medicine, 151(4), 264-269. https://doi.org/10.7326/0003-4819-151-4-200908180-00135
  18. Mazaheri, M. E., Taheri, F., & Sarmadi, S. B. (2020). Lurking eyes: A method to detect side-channel attacks on javascript and webassembly. In 2020 17th international isc conference on information security and cryptology (iscisc) (p. 1-6). doi: 10.1109/ISCISC51277.2020.9261920.
  19. Yang, W., Zhang, H., Gao, Y., Fu, A., & Wei, S. (2020). Side-channel leakage detection based on constant parameter channel model. In 2020 ieee 38th international conference on computer design (iccd) (p. 553-560). doi: 10.1109/ICCD50377.2020.0009.
  20. Wang, H., Sayadi, H., Kolhe, G., Sasan, A., Rafatirad, S., & Homayoun, H. (2020). Phased-guard: Multi-phase machine learning framework for detection and identification of zero-day microarchitectural side-channel attacks. In 2020 ieee 38th international conference on computer design (iccd) (p. 648-655). doi: 10.1109/ICCD50377.2020.00111.
  21. Lescisin, M., & Mahmoud, Q. H. (2021). A machine learning based monitoring framework for side-channel information leaks. IEEE Open Journal of the Computer Society, 2, 139-151. doi: 10.1109/OJCS.2021.3061445.
  22. Gattu, N., Khan, M. N. I., De, A., & Ghosh, S. (2020). Power side channel attack analysis and detection. In Proceedings of the 39th international conference on computer-aided design. New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3400302.3415692 doi: 10.1145/3400302.3415692.
  23. Brennan, T., Saha, S., & Bultan, T. (2020). Jvm fuzzing for jit-induced side-channel detection. In Proceedings of the acm/ieee 42nd international conference on software engineering (p. 1011-1023). New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3377811.3380432 doi:10.1145/3377811.3380432.
  24. a Drees, J. P., Gupta, P., Hullermeier, E., Jager, T., Konze, A., Priesterjahn, C., . . . Somorovsky, J. (2021). Automated detection of side channels in cryptographic protocols: Drown the robots! In Proceedings of the 14th acm workshop on artificial intelligence and security (p. 169-180). New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3474369.3486868 doi:10.1145/3474369.3486868.
  25. Alam, M., Bhattacharya, S., & Mukhopadhyay, D. (2021, jan). Victims can be saviors: A machine learning-based detection for micro-architectural side-channel attacks. J. Emerg. Technol. Comput. Syst., 17 (2). Retrieved from https://doi.org/10.1145/3439189 doi:10.1145/3439.
  26. Wang, H., Sayadi, H., Sasan, A., Rafatirad, S., & Homayoun, H. (2020). Hybrid-shield: Accurate and efficient cross-layer countermeasure for run-time detection and mitigation of cache-based side-channel attacks. In Proceedings of the 39th international conference on computer-aided design. New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3400302.3418783 doi:10.1145/3400302.3418783.
  27. Pouyanrad, S., Muhlberg, J. T., & Joosen, W. (2020). Scfmsp: Static detection of side channels in msp430 programs. In Proceedings of the 15th international conference on availability, reliability and security. New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3407023.3407050 doi:10.1145/3407023.3407050
  28. Sayadi, H., Wang, H., Miari, T., Makrani, H. M., Aliasgari, M., Rafatirad, S., & Homayoun, H. (2020). Recent advancements in microarchitectural security: Review of machine learning countermeasures. In 2020 ieee 63rd international midwest symposium on circuits and systems (mwscas) (pp.949-952).
  29. Wang, H., Sayadi, H., Mohsenin, T., Zhao, L., Sasan, A., Rafatirad, S., & Homayoun, H. (2020). Mitigating cache-based side-channel attacks through randomization: A comprehensive system and architecture level analysis. In 2020 design, automation & test in europe conference & exhibition (date) (pp. 1414-1419).
  30. Bleichenbacher, D. (1998). Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs# 1. In Annual international cryptology conference (pp. 1-12).