2018
DOI: 10.1109/comst.2017.2779824
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Abstract: Abstract-Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditional side-channel attacks, such as power analysis attacks and electromagnetic analysis attacks, required physical presence of the attacker as well as expensive equipment, an (unprivileged) application is all it takes to exploit the leaking information on modern mobile devices. Given the vast amount of sensitive information that are stored on smartphones, the ramifications of side-chan… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
109
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 179 publications
(120 citation statements)
references
References 140 publications
(170 reference statements)
1
109
0
Order By: Relevance
“…The second type is known as a combined side channels attack, which could improve the accuracy of existing attacks or cope with more sophisticated attack scenarios. Some research recently started to explore the attacks from combined side channels [20,36,37,55]. However, these work only focus on a single domain, which has limitations in employing the information from both sides.…”
Section: Related Workmentioning
confidence: 99%
“…The second type is known as a combined side channels attack, which could improve the accuracy of existing attacks or cope with more sophisticated attack scenarios. Some research recently started to explore the attacks from combined side channels [20,36,37,55]. However, these work only focus on a single domain, which has limitations in employing the information from both sides.…”
Section: Related Workmentioning
confidence: 99%
“…The phase of side-channel attacks on mobile devices usually consists of three steps [11]. (1) A malicious application is spread through popular app markets.…”
Section: Threat Modelsmentioning
confidence: 99%
“…Meanwhile, the globalization of IC design and manufacturing introduces hardware security threats such as hardware trojans, side-channel analysis, and IC reverse engineering (RE). [19][20][21] Hardware-oriented security offers new Compementary metal-oxide semiconductor (CMOS)-based security primitives like true random number generators (TRNGs), physically unclonable functions, and other circuit design methodologies to make systems robust against security attacks. [22][23][24] However, CMOS-based security primitives consume high power and area and require additional source/drain doping variations to create stealthy manipulations for obfuscation.…”
Section: Introductionmentioning
confidence: 99%