Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.6.38

Side-Channel Attacks Detection Methods: A Survey  

Assaeedi, Joanna (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
Alsuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.6, 2022 , pp. 288-296 More about this Journal
Abstract
Side-channel attacks are a quiet mighty type of attack that targets specific physical implementations vulnerabilities. Even though several researchers have examined diverse means and methods of detecting side-channel attacks, at the present time a systematic review of these approaches does not exist. The purposes of this paper are to give an extensive analysis of literature on side-channel attack detection and offer intuitiveness from past research studies. In this study, a literature survey is conducted on articles related to side-channel attack detection between 2020 and 2022 from ACM and IEEE digital libraries. From the 10 publications included in the study, it appears they target either a single type of side-channel attacks or multiple types of side-channel attacks. Therefore, a vital review of each of the two categories is provided, as well as possible prospective research in this field of study.
Keywords
Side-channel attacks; Survey; Cryptanalysis; Detection of side-channel attacks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Wang, H., Sayadi, H., Kolhe, G., Sasan, A., Rafatirad, S., & Homayoun, H. (2020). Phased-guard: Multi-phase machine learning framework for detection and identification of zero-day microarchitectural side-channel attacks. In 2020 ieee 38th international conference on computer design (iccd) (p. 648-655). doi: 10.1109/ICCD50377.2020.00111.   DOI
2 Lescisin, M., & Mahmoud, Q. H. (2021). A machine learning based monitoring framework for side-channel information leaks. IEEE Open Journal of the Computer Society, 2, 139-151. doi: 10.1109/OJCS.2021.3061445.   DOI
3 Gattu, N., Khan, M. N. I., De, A., & Ghosh, S. (2020). Power side channel attack analysis and detection. In Proceedings of the 39th international conference on computer-aided design. New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3400302.3415692 doi: 10.1145/3400302.3415692.   DOI
4 a Drees, J. P., Gupta, P., Hullermeier, E., Jager, T., Konze, A., Priesterjahn, C., . . . Somorovsky, J. (2021). Automated detection of side channels in cryptographic protocols: Drown the robots! In Proceedings of the 14th acm workshop on artificial intelligence and security (p. 169-180). New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3474369.3486868 doi:10.1145/3474369.3486868.   DOI
5 Alam, M., Bhattacharya, S., & Mukhopadhyay, D. (2021, jan). Victims can be saviors: A machine learning-based detection for micro-architectural side-channel attacks. J. Emerg. Technol. Comput. Syst., 17 (2). Retrieved from https://doi.org/10.1145/3439189 doi:10.1145/3439.   DOI
6 Wang, H., Sayadi, H., Sasan, A., Rafatirad, S., & Homayoun, H. (2020). Hybrid-shield: Accurate and efficient cross-layer countermeasure for run-time detection and mitigation of cache-based side-channel attacks. In Proceedings of the 39th international conference on computer-aided design. New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3400302.3418783 doi:10.1145/3400302.3418783.   DOI
7 Sayadi, H., Wang, H., Miari, T., Makrani, H. M., Aliasgari, M., Rafatirad, S., & Homayoun, H. (2020). Recent advancements in microarchitectural security: Review of machine learning countermeasures. In 2020 ieee 63rd international midwest symposium on circuits and systems (mwscas) (pp.949-952).
8 Yang, W., Zhang, H., Gao, Y., Fu, A., & Wei, S. (2020). Side-channel leakage detection based on constant parameter channel model. In 2020 ieee 38th international conference on computer design (iccd) (p. 553-560). doi: 10.1109/ICCD50377.2020.0009.   DOI
9 Sayakkara, A., Le-Khac, N.-A., & Scanlon, M. (2019). A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digital Investigation, 29, 43-54.   DOI
10 Pouyanrad, S., Muhlberg, J. T., & Joosen, W. (2020). Scfmsp: Static detection of side channels in msp430 programs. In Proceedings of the 15th international conference on availability, reliability and security. New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3407023.3407050 doi:10.1145/3407023.3407050   DOI
11 Brennan, T., Saha, S., & Bultan, T. (2020). Jvm fuzzing for jit-induced side-channel detection. In Proceedings of the acm/ieee 42nd international conference on software engineering (p. 1011-1023). New York, NY, USA: Association for Computing Machinery. Retrieved from https://doi.org/10.1145/3377811.3380432 doi:10.1145/3377811.3380432.   DOI
12 Quisquater, J.-J., & Koene, F. (2009). Side channel attacks: State of the art, october 2002. Available from http://www.ipa.go.jp/security/enc/CRYPTREC/fy15/doc/1047 Side Channel report. pdf.
13 Verbauwhede, I. M. (2010). Secure integrated circuits and systems. Springer.
14 Lawson, N. (2009). Side-channel attacks on cryptographic software. IEEE Security & Privacy, 7(6), 65-68.   DOI
15 Fan, J., Guo, X., De Mulder, E., Schaumont, P., Preneel, B., & Verbauwhede, I. (2010). State-of-the-art of secure ecc implementations: a survey on known side-channel attacks and countermeasures. In 2010 ieee international symposium on hardware-oriented security and trust (host) (pp. 76-87).
16 Pongaliur, K., Abraham, Z., Liu, A. X., Xiao, L., & Kempel, L. (2008). Securing sensor nodes against side channel attacks. In 2008 11th ieee high assurance systems engineering symposium (pp. 353-361).
17 Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Annual international cryptology conference (pp. 388-397).
18 Getz, R., & Moeckel, B. (1996). Understanding and eliminating emi in microcontroller applications. National Semiconductor.
19 Sayakkara, A., Le-Khac, N.-A., & Scanlon, M. (2018). Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis. In Companion proceedings for the issta/ecoop 2018 workshops (pp.138-143).
20 Moher, D., Liberati, A., Tetzlaff, J., Altman, D. G., & Group*, P. (2009). Preferred reporting items for systematic reviews and meta-analyses: the prisma statement. Annals of internal medicine, 151(4), 264-269.   DOI
21 Wang, H., Sayadi, H., Rafatirad, S., Sasan, A., & Homayoun, H. (2020). Scarf: Detecting side-channel attacks at real-time using low-level hardware features. In 2020 ieee 26th international symposium on on-line testing and robust system design (iolts) (pp. 1-6).
22 Bleichenbacher, D. (1998). Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs# 1. In Annual international cryptology conference (pp. 1-12).
23 Okeya, K., & Sakurai, K. (2003). A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks. In Proceedings 2003 ieee information theory workshop (cat. no. 03ex674) (pp. 175-178).
24 Rahaman, M. Z., & Hossain, M. A. (2008). Side channel attack prevention for aes smart card. In 2008 11th international conference on computer and information technology (pp. 376-380).
25 Kocher, P. C. (1996). Timing attacks on implementations of diffiehellman, rsa, dss, and other systems. In Annual international cryptology conference (pp. 104-113).
26 Mazaheri, M. E., Taheri, F., & Sarmadi, S. B. (2020). Lurking eyes: A method to detect side-channel attacks on javascript and webassembly. In 2020 17th international isc conference on information security and cryptology (iscisc) (p. 1-6). doi: 10.1109/ISCISC51277.2020.9261920.   DOI
27 Wang, H., Sayadi, H., Mohsenin, T., Zhao, L., Sasan, A., Rafatirad, S., & Homayoun, H. (2020). Mitigating cache-based side-channel attacks through randomization: A comprehensive system and architecture level analysis. In 2020 design, automation & test in europe conference & exhibition (date) (pp. 1414-1419).
28 Merriam-Webster. (n.d.). Cryptography definition & meaning. Retrieved March 12, 2022, from https://www.merriam-webster.com/dictionary/cryptography.
29 Randolph, M., & Diehl, W. (2020). Power side-channel attack analysis: A review of 20 years of study for the layman. Cryptography, 4 (2), 15.   DOI
30 Joy Persial, G., Prabhu, M., & Shanmugalakshmi, R. (2011). Side channel attack-survey. Int J Adva Sci Res Rev, 1(4), 54-57.