Power Analysis and Clock Glitching with the Open-Source ChipWhisperer Platform
There’s a variety of well-known attack methods which seem to have ‘mythical’ power, in particular side-channel power analysis attacks, and clock glitching attacks. In truth these attacks are extremely simple and require very little in terms of tools in order to perform the attacks. But there’s been little work in true open-source & easily usable projects to teach yourself how to perform these attacks.
This talk introduces the theory behind a variety of these attacks, and more interestingly also demonstrates some hardware that YOU can build (or buy if you’re lazy) to perform these attacks. All of these attack vectors have been well known in the research community, but there has been a lack of practical examples of performing this on your own. This talk aims to bridge that gap. Spend 60 minutes getting a broad overview of the tools and attacks, then spend some time on your own learning about all of these attacks.
The tools used in the attack demos are part of the 'ChipWhisperer' project which the speaker started, and allows you to perform side-channel power analysis on devices without requiring any expensive hardware. This talk is an extension of his previous talk 'Side Channel Analysis for Cheapskates', which keeps the same spirit of low-cost experimentation, but adds several new attacks to the mix. Live hardware demos are provided where applicable, although time is limited. Feel free to bother the speaker for a private demo after his talk if you want more!
Speakers
Colin O’Flynn |