2019
DOI: 10.1016/j.diin.2019.04.012
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices

Abstract: Internet of Things (IoT) devices have expanded the horizon of digital forensic investigations by providing a rich set of new evidence sources. IoT devices includes health implants, sports wearables, smart burglary alarms, smart thermostats, smart electrical appliances, and many more. Digital evidence from these IoT devices is often extracted from third party sources, e.g., paired smartphone applications or the devices' back-end cloud services. However vital digital evidence can still reside solely on the IoT d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(15 citation statements)
references
References 27 publications
0
15
0
Order By: Relevance
“…The Knownplaintext attack, Ciphertext-only attack and Chosenplaintext attack are some of the other examples of cryptanalysis attacks [123].  Side-Channel Information Attacks: During the process of the encryption operation, the attacker obtains information and performs a reverse-engineering process to gather the cryptographic credentials of an IoT device [124], [125]. This information can be gained from the encryption devices, not from plaintext or ciphertext during the encryption process.…”
Section: ) Multi-layer/dimensional Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The Knownplaintext attack, Ciphertext-only attack and Chosenplaintext attack are some of the other examples of cryptanalysis attacks [123].  Side-Channel Information Attacks: During the process of the encryption operation, the attacker obtains information and performs a reverse-engineering process to gather the cryptographic credentials of an IoT device [124], [125]. This information can be gained from the encryption devices, not from plaintext or ciphertext during the encryption process.…”
Section: ) Multi-layer/dimensional Attacksmentioning
confidence: 99%
“…Both results confirm that the accuracy rate of authentication of the method achieves 84% without requiring manual labeling. The authors in [125] proposed a learning-based algorithm to detect sidechannel attacks and showed 82% and 90% detection accuracy on high-end and low-end IoT devices, respectively.…”
Section: A Learning-based Countermeasuresmentioning
confidence: 99%
“…Side-channels and covert-channels have been well studied in many research domains. Typical side-channels such as cache access time [26], power consumption traces [27], electromagnetic emanations [25], temperature [28], etc., may also be seen against real-time system (RTS). In this paper, we focus on scheduler-based channels.…”
Section: Scheduleak [8]mentioning
confidence: 99%
“…Note that, 25MHz here corresponds to the main frequency of MSP430 MCU, while 50MHz is its harmonic. Therefore, it is easy to develop classification algorithms (e.g., neural network-based [25]) to automatically distinguish them, then constructing execution sequences.…”
Section: A Obtain the Execution Sequencesmentioning
confidence: 99%
“…Due to the non-invasive nature of EM-SCA, it has been proposed to be used as a forensic insight-gathering method. Various types of forensic insights have been demonstrated to be acquirable from IoT devices in the literature [7], [8]. This work explores the potential of utilising EM radiation of smartphones as a method to acquire forensic insights from them during triage examination and live analysis of an investigation.…”
Section: Introductionmentioning
confidence: 99%