A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key

Modern microcontrollers (MCUs) come packed with features to support rising demand of security and privacy in different applications. Features like hardware support for cryptography, trusted execution environment, memory protection, etc are widely available. In this paper, we take a deeper look into...

Full description

Saved in:
Bibliographic Details
Main Authors: Won, Yoo-Seung, Bhasin, Shivam
Other Authors: 2021 IEEE International Symposium on Circuits and Systems (ISCAS)
Format: Conference or Workshop Item
Language:English
Published: 2021
Subjects:
Online Access:https://hdl.handle.net/10356/147151
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-147151
record_format dspace
spelling sg-ntu-dr.10356-1471512021-07-03T20:12:07Z A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key Won, Yoo-Seung Bhasin, Shivam 2021 IEEE International Symposium on Circuits and Systems (ISCAS) Temasek Laboratories Engineering::Computer science and engineering Hardware AES Engine Side-channel Analysis Modern microcontrollers (MCUs) come packed with features to support rising demand of security and privacy in different applications. Features like hardware support for cryptography, trusted execution environment, memory protection, etc are widely available. In this paper, we take a deeper look into ARM Cortex M33 microcontroller designed to support critical applications like point of sale, smart home, smart factory, etc. In particular, we demonstrate architecture recovery of black box AES engine using side-channel analysis. The architecture is then exploited through side-channels to recover device intrinsic keys based on physical unclonable functions. Finally, feasibility of cross-device attacks are investigated with deep learning based side-channel attacks. Our results give a better insight into embedded AES engine available off-the shelf and allow user to design secure applications knowing such vulnerabilities at design time. Accepted version The authors acknowledge the support from the "National Integrated Centre of Evaluation" (NICE); a facility of Cyber Security Agency, Singapore (CSA). We gratefully acknowledge the support of NVIDIA Corporation with the donation of the Titan Xp GPU used for this research. 2021-07-01T05:35:41Z 2021-07-01T05:35:41Z 2021 Conference Paper Won, Y. & Bhasin, S. (2021). A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key. 2021 IEEE International Symposium on Circuits and Systems (ISCAS). https://dx.doi.org/10.1109/ISCAS51556.2021.9401404 978-1-7281-9202-4 0271-4302 https://hdl.handle.net/10356/147151 10.1109/ISCAS51556.2021.9401404 en © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/ISCAS51556.2021.9401404. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
Hardware AES Engine
Side-channel Analysis
spellingShingle Engineering::Computer science and engineering
Hardware AES Engine
Side-channel Analysis
Won, Yoo-Seung
Bhasin, Shivam
A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key
description Modern microcontrollers (MCUs) come packed with features to support rising demand of security and privacy in different applications. Features like hardware support for cryptography, trusted execution environment, memory protection, etc are widely available. In this paper, we take a deeper look into ARM Cortex M33 microcontroller designed to support critical applications like point of sale, smart home, smart factory, etc. In particular, we demonstrate architecture recovery of black box AES engine using side-channel analysis. The architecture is then exploited through side-channels to recover device intrinsic keys based on physical unclonable functions. Finally, feasibility of cross-device attacks are investigated with deep learning based side-channel attacks. Our results give a better insight into embedded AES engine available off-the shelf and allow user to design secure applications knowing such vulnerabilities at design time.
author2 2021 IEEE International Symposium on Circuits and Systems (ISCAS)
author_facet 2021 IEEE International Symposium on Circuits and Systems (ISCAS)
Won, Yoo-Seung
Bhasin, Shivam
format Conference or Workshop Item
author Won, Yoo-Seung
Bhasin, Shivam
author_sort Won, Yoo-Seung
title A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key
title_short A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key
title_full A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key
title_fullStr A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key
title_full_unstemmed A systematic side-channel evaluation of black box AES in secure MCU : architecture recovery and retrieval of PUF based secret key
title_sort systematic side-channel evaluation of black box aes in secure mcu : architecture recovery and retrieval of puf based secret key
publishDate 2021
url https://hdl.handle.net/10356/147151
_version_ 1705151294201659392