A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key
Modern microcontrollers (MCUs) come packed with features to support rising demand of security and privacy in different applications. Features like hardware support for cryptography, trusted execution environment, memory protection, etc are widely available. In this paper, we take a deeper look into...
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/147151 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-147151 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1471512021-07-03T20:12:07Z A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key Won, Yoo-Seung Bhasin, Shivam 2021 IEEE International Symposium on Circuits and Systems (ISCAS) Temasek Laboratories Engineering::Computer science and engineering Hardware AES Engine Side-channel Analysis Modern microcontrollers (MCUs) come packed with features to support rising demand of security and privacy in different applications. Features like hardware support for cryptography, trusted execution environment, memory protection, etc are widely available. In this paper, we take a deeper look into ARM Cortex M33 microcontroller designed to support critical applications like point of sale, smart home, smart factory, etc. In particular, we demonstrate architecture recovery of black box AES engine using side-channel analysis. The architecture is then exploited through side-channels to recover device intrinsic keys based on physical unclonable functions. Finally, feasibility of cross-device attacks are investigated with deep learning based side-channel attacks. Our results give a better insight into embedded AES engine available off-the shelf and allow user to design secure applications knowing such vulnerabilities at design time. Accepted version The authors acknowledge the support from the "National Integrated Centre of Evaluation" (NICE); a facility of Cyber Security Agency, Singapore (CSA). We gratefully acknowledge the support of NVIDIA Corporation with the donation of the Titan Xp GPU used for this research. 2021-07-01T05:35:41Z 2021-07-01T05:35:41Z 2021 Conference Paper Won, Y. & Bhasin, S. (2021). A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key. 2021 IEEE International Symposium on Circuits and Systems (ISCAS). https://dx.doi.org/10.1109/ISCAS51556.2021.9401404 978-1-7281-9202-4 0271-4302 https://hdl.handle.net/10356/147151 10.1109/ISCAS51556.2021.9401404 en © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/ISCAS51556.2021.9401404. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering Hardware AES Engine Side-channel Analysis |
spellingShingle |
Engineering::Computer science and engineering Hardware AES Engine Side-channel Analysis Won, Yoo-Seung Bhasin, Shivam A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key |
description |
Modern microcontrollers (MCUs) come packed with features to support rising demand of security and privacy in different applications. Features like hardware support for cryptography, trusted execution environment, memory protection, etc are widely available. In this paper, we take a deeper look into ARM Cortex M33 microcontroller designed to support critical applications like point of sale, smart home, smart factory, etc. In particular, we demonstrate architecture recovery of black box AES engine using side-channel analysis. The architecture is then exploited through side-channels to recover device intrinsic keys based on physical unclonable functions. Finally, feasibility of cross-device attacks are investigated with deep learning based side-channel attacks. Our results give a better insight into embedded AES engine available off-the shelf and allow user to design secure applications knowing such vulnerabilities at design time. |
author2 |
2021 IEEE International Symposium on Circuits and Systems (ISCAS) |
author_facet |
2021 IEEE International Symposium on Circuits and Systems (ISCAS) Won, Yoo-Seung Bhasin, Shivam |
format |
Conference or Workshop Item |
author |
Won, Yoo-Seung Bhasin, Shivam |
author_sort |
Won, Yoo-Seung |
title |
A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key |
title_short |
A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key |
title_full |
A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key |
title_fullStr |
A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key |
title_full_unstemmed |
A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key |
title_sort |
systematic side-channel evaluation of black box aes in secure mcu : architecture recovery and retrieval of puf based secret key |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/147151 |
_version_ |
1705151294201659392 |