Side-Channel Attacks on the Mobile Phones: Applicability and Improvements

On one hand, side-channel attacks are a powerful approach to cryptoanalysis, on the other hand, these attacks have a very specific attacker model. As a result, a practical application of SCA is sometimes disputable. The threat level in each case has to be evaluated given individual features of a certain target system. Endpoint client applications like mobile phone applications are especially vulnerable because of an uncomplicated access to the device. More attention has to be paid to their security since they’re more accessible to an attacker and usually carry a large amount of sensitive information.

[1]  Yuval Yarom,et al.  ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels , 2016, IACR Cryptol. ePrint Arch..

[2]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[3]  Manfred Pinkal,et al.  Acoustic Side-Channel Attacks on Printers , 2010, USENIX Security Symposium.

[4]  Adi Shamir,et al.  Acoustic Cryptanalysis , 2017, Journal of Cryptology.

[5]  Nicolas Sklavos,et al.  Side Channel Attacks Cryptanalysis against Block Ciphers Based on FPGA Devices , 2010, 2010 IEEE Computer Society Annual Symposium on VLSI.

[6]  Georg Sigl,et al.  Side Channel Attacks on Smartphones and Embedded Devices Using Standard Radio Equipment , 2015, COSADE.

[7]  Sylvain Guilley,et al.  NICV: Normalized inter-class variance for detection of side-channel leakage , 2014, 2014 International Symposium on Electromagnetic Compatibility, Tokyo.

[8]  Daniel Genkin,et al.  Get your hands off my laptop: physical side-channel key-extraction attacks on PCs , 2014, Journal of Cryptographic Engineering.

[9]  Catherine H. Gebotys,et al.  EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA , 2005, CHES.

[10]  Lin Yan,et al.  A Study on Power Side Channels on Mobile Devices , 2015, Internetware.

[11]  J. G. F. Francis,et al.  The QR Transformation A Unitary Analogue to the LR Transformation - Part 1 , 1961, Comput. J..

[12]  Aleksandr Ometov,et al.  Mobile Social Networking Under Side-Channel Attacks: Practical Security Challenges , 2017, IEEE Access.

[13]  Roman Mostovoy,et al.  SCA as mobile security threat , 2017, 2017 20th Conference of Open Innovations Association (FRUCT).

[14]  François-Xavier Standaert,et al.  Introduction to Side-Channel Attacks , 2010, Secure Integrated Circuits and Systems.

[15]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[16]  Stefan Mangard,et al.  Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices , 2016, IEEE Communications Surveys & Tutorials.