Title :
Methodology for attack on a Java-based PDA
Author :
Gebotys, C.H. ; White, B.A.
Author_Institution :
Univ. of Waterloo, Waterloo
Abstract :
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating from the wireless device during a cryptographic computation does leak sufficient information, it may be possible for an attacker to reconstruct the secret key. Possession of the secret cryptographic key would render all future wireless communications insecure and cause further potential problems such as identity theft. Despite the complexities of a Java-based PDA device, this paper proposes and verifies a methodology which confirms EM attacks are possible. The proposed methodology involves pre-characterization of the PDA device through SEMA, thresholding, pattern recognition, and frequency-based DEMA. Results are repeatable over several different secret keys. Unlike previous research the new methodology does not require perfect alignment of EM frames and demonstrates robustness in the presence of a complex embedded system. This research is important for future wireless embedded systems which will increasingly demand higher levels of security.
Keywords :
Java; cryptography; mobile computing; notebook computers; Java-based PDA; SEMA; cryptographic computation; electromagnetic attacks; frequency-based DEMA; mobile Java code; pattern recognition; secret cryptographic key; wireless communications; wireless devices; Cryptography; Electromagnetic devices; Embedded system; Frequency; Information analysis; Java; Pattern recognition; Personal digital assistants; Robustness; Wireless communication; embedded system;
Conference_Titel :
Hardware/Software Codesign and System Synthesis, 2006. CODES+ISSS '06. Proceedings of the 4th International Conference
Conference_Location :
Seoul
Print_ISBN :
1-59593-370-0
Electronic_ISBN :
1-59593-370-0
DOI :
10.1145/1176254.1176279