skip to main content
10.1145/3236454.3236512acmconferencesArticle/Chapter ViewAbstractPublication PagesisstaConference Proceedingsconference-collections
research-article

Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis

Published:16 July 2018Publication History

ABSTRACT

Digital forensics is fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are often hampered by the data contained on these devices being encrypted. Furthermore, the increasing use of IoT devices with limited standardisation makes it difficult to analyse them with traditional techniques. This paper argues that electromagnetic side-channel analysis has significant potential to progress investigations obstructed by data encryption. Several potential avenues towards this goal are discussed.

References

  1. Dakshi Agrawal, Josyula R Rao, and Pankaj Rohatgi. 2003. Multi-channel attacks. In International Workshop on Cryptographic Hardware and Embedded Systems (CHES). Springer, 2--16.Google ScholarGoogle ScholarCross RefCross Ref
  2. Mohd Shahdi Ahmad, Nur Emyra Musa, Rathidevi Nadarajah, Rosilah Hassan, and Nor Effendy Othman. 2013. Comparison between android and iOS Operating System in terms of security. In 8th International Conference on Information Technology in Asia (CITA). IEEE, 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  3. Vasudev Bhaskaran and Konstantinos Konstantinides. 1997. Image and video compression standards: algorithms and architectures. Vol. 408. Springer Science & Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Robert Callan, Farnaz Behrang, Alenka Zajic, Milos Prvulovic, and Alessandro Orso. 2016. Zero-overhead profiling via em emanations. In Proceedings of the 25th International Symposium on Software Testing and Analysis. ACM, 401--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Robert Callan, Alenka Zajic, and Milos Prvulovic. 2014. A practical methodology for measuring the side-channel signal available to the attacker for instruction-level events. In 47th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 242--254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Abbas Cheddad, Joan Condell, Kevin Curran, and Paul Mc Kevitt. 2010. Digital image steganography: Survey and analysis of current methods. Signal Processing 90, 3 (2010), 727--752. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Vicka Corey, Charles Peterman, Sybil Shearin, Michael S Greenberg, and James Van Bokkelen. 2002. Network forensics analysis. IEEE Internet Computing 6, 6 (2002), 60--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Randall D Deppensmith and Samuel J Stone. 2014. Optimized fingerprint generation using unintentional emission radio-frequency distinct native attributes (RF-DNA). In Aerospace and Electronics Conference, NAECON 2014-IEEE National. IEEE, 327--330.Google ScholarGoogle ScholarCross RefCross Ref
  9. Xiaoyu Du, Nhien-An Le-Khac, and Mark Scanlon. 2017. Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service. In Proceedings of the 16th European Conference on Cyber Warfare and Security (ECCWS 2017). ACPI, Dublin, Ireland, 573--581.Google ScholarGoogle Scholar
  10. Robin Getz and Bob Moeckel. 1996. Understanding and eliminating EMI in Microcontroller Applications. National Semiconductor (1996).Google ScholarGoogle Scholar
  11. Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, and Yuval Elovici. 2015. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies.. In USENIX Security Symposium. 849--864. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Brian Hay, Matt Bishop, and Kara Nance. 2009. Live analysis: Progress and challenges. IEEE Security & Privacy 7, 2 (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Advances in Cryptology (CRYPTO '99). Springer, 789--789. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Paul Kocher, Joshua Jaffe, Benjamin Jun, and Pankaj Rohatgi. 2011. Introduction to differential power analysis. Journal of Cryptographic Engineering 1, 1 (2011), 5--27.Google ScholarGoogle ScholarCross RefCross Ref
  15. Markus G Kuhn and Ross J Anderson. 1998. Soft tempest: Hidden data transmission using electromagnetic emanations. In International Workshop on Information Hiding. Springer, 124--142.Google ScholarGoogle ScholarCross RefCross Ref
  16. Liran Lerman, Gianluca Bontempi, and Olivier Markowitch. 2011. Side channel attack: an approach based on machine learning. In Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Security Design (COSADE). Schindler and Huss, 29--41.Google ScholarGoogle Scholar
  17. David Lillis, Brett Becker, Tadhg O'Sullivan, and Mark Scanlon. 2016. Current Challenges and Future Research Areas for Digital Forensic Investigation. In The 11th ADFSL Conference on Digital Forensics, Security and Law (CDFSL 2016). ADFSL, Daytona Beach, FL, USA, 9--20.Google ScholarGoogle Scholar
  18. David Lillis, Frank Breitinger, and Mark Scanlon. 2018. Hierarchical Bloom Filter Trees for Approximate Matching. Journal of Digital Forensics, Security and Law 13, 1 (01 2018).Google ScholarGoogle Scholar
  19. Aine MacDermott, Thar Baker, and Qi Shi. 2018. IoT Forensics: Challenges For The IoA Era. In New Technologies, Mobility and Security (NTMS), 2018 9th IFIP International Conference on. IEEE, 1--5.Google ScholarGoogle Scholar
  20. Houssem Maghrebi, Thibault Portigliatti, and Emmanuel Prouff. 2016. Breaking cryptographic implementations using deep learning techniques. In International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, 3--26.Google ScholarGoogle ScholarCross RefCross Ref
  21. Alireza Nazari, Nader Sehatbakhsh, Monjur Alam, Alenka Zajic, and Milos Prvulovic. 2017. EDDIE: EM-Based Detection of Deviations in Program Execution. In Proceedings of the 44th Annual International Symposium on Computer Architecture. ACM, 333--346. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Romain Poussier, Vincent Grosso, and François-Xavier Standaert. 2015. Comparing approaches to rank estimation for side-channel security evaluations. In International Conference on Smart Card Research and Advanced Applications. Springer, 125--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Jean-Jacques Quisquater and David Samyde. 2001. Electromagnetic Analysis (EMA): Measures and counter-measures for smart cards. Smart Card Programming and Security (2001), 200--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. Ramsay and J. Lohuis. White Paper: TEMPEST attacks against AES covertly stealing keys for 200 euros. Technical Report. Fox-IT, Netherlands. 10 pages. https://www.fox-it.com/nl/wp-content/uploads/sites/12/Tempest_attacks_against_AES.pdfGoogle ScholarGoogle Scholar
  25. Hendra Saputra, Narayanan Vijaykrishnan, M Kandemir, Mary Jane Irwin, R Brooks, Soontae Kim, and Wei Zhang. 2003. Masking the energy behavior of DES encryption. In Proceedings of the conference on Design, Automation and Test in Europe-Volume 1. IEEE Computer Society, 10084. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Asanka Sayakkara, Nhien-An Le-Khac, and Mark Scanlon. 2018. Accuracy Enhancement of Electromagnetic Side-channel Attacks on Computer Monitors. In The 2nd International Workshop on Criminal Use of Information Hiding (CUING), part of the 13th International Conference on Availability, Reliability and Security (ARES) (ARES '17). ACM, Hamburg, Germany. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Mark Scanlon, Jason Farina, and M-Tahar Kechadi. 2015. Network Investigation Methodology for BitTorrent Sync: A Peer-to-Peer Based File Synchronisation Service. Computers & Security 54 (10 2015), 27 -- 43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Matthias Schulz, Patrick Klapper, Matthias Hollick, Erik Tews, and Stefan Katzen-beisser. 2016. Trust the wire, they always told me!: On practical non-destructive wire-tap attacks against Ethernet. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, 43--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Somayeh Soltani and Seyed Amin Hosseini Seno. 2017. A survey on digital evidence collection and analysis. In 7th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, 247--253.Google ScholarGoogle ScholarCross RefCross Ref
  30. Barron Stone and Samuel Stone. 2016. Comparison of Radio Frequency Based Techniques for Device Discrimination and Operation Identification. In 11th International Conference on Cyber Warfare and Security: ICCWS2016. Academic Conferences and Publishing Limited, 475.Google ScholarGoogle Scholar
  31. Walter HW Tuttlebee. 2003. Software defined radio: enabling technologies. John Wiley & Sons.Google ScholarGoogle Scholar
  32. Wim Van Eck. 1985. Electromagnetic radiation from video display units: An eavesdropping risk? Computers & Security 4, 4 (1985), 269--286. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Eva A Vincze. 2016. Challenges in digital forensics. Police Practice and Research 17, 2 (2016), 183--194.Google ScholarGoogle ScholarCross RefCross Ref
  34. Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, and Yu-ichi Hayashi. 2017. POSTER: Is Active Electromagnetic Side-channel Attack Practical?. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2587--2589. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Marc Witteman and Martijn Oostdijk. 2008. Secure application programming in the presence of side channel attacks. In RSA Conference, Vol. 2008.Google ScholarGoogle Scholar
  36. Marc F Witteman, Jasper GJ van Woudenberg, and Federico Menarini. 2011. Defeating RSA Multiply-Always and Message Blinding Countermeasures. In Cryptographersfi Track at the RSA Conference (CT-RSA), Vol. 6558. Springer, 77--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Chouchang Jack Yang and Alanson P Sample. 2017. EM-Comm: Touch-based Communication via Modulated Electromagnetic Emissions. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 118. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ISSTA '18: Companion Proceedings for the ISSTA/ECOOP 2018 Workshops
      July 2018
      143 pages
      ISBN:9781450359399
      DOI:10.1145/3236454

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 July 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate58of213submissions,27%

      Upcoming Conference

      ISSTA '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader