Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/108081
Citations
Scopus Web of Science® Altmetric
?
?
Type: Conference paper
Title: ECDSA key extraction from mobile devices via nonintrusive physical side channels
Author: Genkin, D.
Pachmanov, L.
Pipman, I.
Tromer, E.
Yarom, Y.
Citation: Proceedings of the ACM Conference on Computer and Communications Security, 2016, vol.24-28-October-2016, pp.1626-1638
Publisher: ACM
Issue Date: 2016
ISBN: 9781450341394
ISSN: 1543-7221
Conference Name: 23rd ACM Conference on Computer and Communications Security (CCS) (24 Oct 2016 - 28 Oct 2016 : Vienna, Austria)
Statement of
Responsibility: 
Daniel Genkin, Lev Pachmanov, Itamar Pipman
Abstract: We show that elliptic-curve cryptography implementations on mobile devices are vulnerable to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDSA secret signing keys from OpenSSL and CoreBitcoin running on iOS devices, and partial key leakage from OpenSSL running on Android and from iOS's Common- Crypto. These non-intrusive attacks use a simple magnetic probe placed in proximity to the device, or a power probe on the phone's USB cable. They use a bandwidth of merely a few hundred kHz, and can be performed cheaply using an audio card and an improvised magnetic probe.
Rights: © 2016 Copyright held by the owner/author(s). . This work is under a Creative Commons Attribution- NonCommercial_Sharealike International 4.0 License
DOI: 10.1145/2976749.2978353
Published version: http://dx.doi.org/10.1145/2976749.2978353
Appears in Collections:Aurora harvest 8
Computer Science publications

Files in This Item:
File Description SizeFormat 
RA_hdl_108081.pdf
  Restricted Access
Restricted Access3.86 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.