Projects per year
Abstract
Memory and disk encryption is a common measure to protect sensitive information in memory from adversaries with physical access. However, physical access also comes with the risk of physical attacks. As these may pose a threat to memory confidentiality, this paper investigates contemporary memory and disk encryption schemes and their implementations with respect to Differential Power Analysis (DPA) and Differential Fault Analysis (DFA). It shows that DPA and DFA recover the keys of all the investigated schemes, including the tweakable block ciphers XEX and XTS. This paper also verifies the feasibility of such attacks in practice. Using the EM side channel, a DPA on the disk encryption employed
within the ext4 file system is shown to reveal the used master key on a Zynq Z-7010 system on chip. The results suggest that memory and disk encryption secure against physical attackers is at least four times more expensive.
within the ext4 file system is shown to reveal the used master key on a Zynq Z-7010 system on chip. The results suggest that memory and disk encryption secure against physical attackers is at least four times more expensive.
Original language | English |
---|---|
Title of host publication | Constructive Side-Channel Analysis and Secure Design - COSADE 2016 |
Publisher | Springer International Publishing AG |
Pages | 3-18 |
DOIs | |
Publication status | Published - 2016 |
Event | International Workshop on Constructive Side-Channel Analysis and Secure Design - Graz, Austria Duration: 14 Apr 2016 → 15 Apr 2016 |
Publication series
Name | LNCS |
---|---|
Volume | 9689 |
Conference
Conference | International Workshop on Constructive Side-Channel Analysis and Secure Design |
---|---|
Country/Territory | Austria |
City | Graz |
Period | 14/04/16 → 15/04/16 |
Keywords
- memory encryption
- side-channel attacks
- DPA
- fault analysis
- DFA
- power analysis
- ext4
Fields of Expertise
- Information, Communication & Computing
Fingerprint
Dive into the research topics of 'Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption'. Together they form a unique fingerprint.Projects
- 1 Finished
-
MEMSEC - Embedded Memory Security Unit for Automotive Test Systems
1/09/14 → 31/08/17
Project: Research project