Side-Channel Attacks in the Internet of Things
- 1 January 2018
- book chapter
- other
- Published by IGI Global in Advances in Systems Analysis, Software Engineering, and High Performance Computing
Abstract
The Internet of Things (IoT) rapidly closes the gap between the virtual and the physical world. As more and more information is processed through this expanding network, the security of IoT devices and backend services is increasingly important. Yet, side-channel attacks pose a significant threat to systems in practice, as the microarchitectures of processors, their power consumption, and electromagnetic emanation reveal sensitive information to adversaries. This chapter provides an extensive overview of previous attack literature. It illustrates that microarchitectural attacks can compromise the entire IoT ecosystem: from devices in the field to servers in the backend. A subsequent discussion illustrates that many of today's security mechanisms integrated in modern processors are in fact vulnerable to the previously outlined attacks. In conclusion to these observations, new countermeasures are needed that effectively defend against both microarchitectural and power/EM based side-channel attacks.This publication has 66 references indexed in Scilit:
- On the Relationship between Correlation Power Analysis and the Stochastic Approach: An ASIC Designer PerspectiveLecture Notes in Computer Science, 2013
- Intel’s New AES Instructions for Enhanced Performance and SecurityLecture Notes in Computer Science, 2009
- Cache-Timing Template AttacksLecture Notes in Computer Science, 2009
- Faster and Timing-Attack Resistant AES-GCMLecture Notes in Computer Science, 2009
- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSLLecture Notes in Computer Science, 2008
- Advances on Access-Driven Cache Attacks on AESLecture Notes in Computer Science, 2007
- A Stochastic Model for Differential Side Channel CryptanalysisLecture Notes in Computer Science, 2005
- Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science, 2004
- Template AttacksLecture Notes in Computer Science, 2003
- Exploiting hardware performance counters with flow and context sensitive profilingACM SIGPLAN Notices, 1997