Side-channel attacks (SCA) exploit the reification of a computation through its physical dimensions (current consumption, EM emission,..). Focusing on Electromagnetic analyses (EMA), such analyses have mostly been considered on low-end devices: smartcards and microcontrollers. In the wake of recent works, we propose to analyze the effects of a modern microarchitecture on the efficiency of EMA (here Correlation Power Analysis and template attacks). We show that despite the difficulty to synchronize the measurements, the speed of the targeted core and the activity of other cores on the same chip can still be accommodated. Finally, we confirm that enabling the secure mode of TrustZone (a hardware-assisted software countermeasure) has no effect whatsoever on the EMA efficiency. Therefore, critical applications in TrustZone are not more secure than in the normal world with respect to EMA, in accordance with the fact that it is not a countermeasure against physical attacks. For the best of our knowledge this is the first application of EMA against TrustZone.
CITATION STYLE
Bukasa, S. K., Lashermes, R., Le Bouder, H., Lanet, J. L., & Legay, A. (2018). How trustzone could be bypassed: Side-channel attacks on a modern system-on-chip. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10741 LNCS, pp. 93–109). Springer Verlag. https://doi.org/10.1007/978-3-319-93524-9_6
Mendeley helps you to discover research relevant for your work.