{"title":"SCA是移动安全威胁","authors":"A. Levina, Pavel Borisenko, R. Mostovoy","doi":"10.23919/FRUCT.2017.8071317","DOIUrl":null,"url":null,"abstract":"Recent time the mobile phones became the main device for the modern society members. Of course, it means that they also became the main target of the attackers. Our team is working on the issue of the mobile security regarding the side-channel attacks. We have faced with a number of challenges which the attacker has to overcome to obtain the sensitive data, but at the same time our research shows that the severity level of the side-channel attacks threat for the mobile security is even more high then we can assume. The instrument available for the any potential malefactor, the consumer-level device, and realy simple technique of the trace gathering allow to distinguish the cryptographic operations in dependency on the used input data. Although on this equipment level the obtaining of the key data is not possible, the attacking algorythms designed during the our research will allow to reach this goal on the more detailed signal records.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"SCA as mobile security threat\",\"authors\":\"A. Levina, Pavel Borisenko, R. Mostovoy\",\"doi\":\"10.23919/FRUCT.2017.8071317\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent time the mobile phones became the main device for the modern society members. Of course, it means that they also became the main target of the attackers. Our team is working on the issue of the mobile security regarding the side-channel attacks. We have faced with a number of challenges which the attacker has to overcome to obtain the sensitive data, but at the same time our research shows that the severity level of the side-channel attacks threat for the mobile security is even more high then we can assume. The instrument available for the any potential malefactor, the consumer-level device, and realy simple technique of the trace gathering allow to distinguish the cryptographic operations in dependency on the used input data. Although on this equipment level the obtaining of the key data is not possible, the attacking algorythms designed during the our research will allow to reach this goal on the more detailed signal records.\",\"PeriodicalId\":114353,\"journal\":{\"name\":\"2017 20th Conference of Open Innovations Association (FRUCT)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 20th Conference of Open Innovations Association (FRUCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/FRUCT.2017.8071317\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 20th Conference of Open Innovations Association (FRUCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/FRUCT.2017.8071317","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Recent time the mobile phones became the main device for the modern society members. Of course, it means that they also became the main target of the attackers. Our team is working on the issue of the mobile security regarding the side-channel attacks. We have faced with a number of challenges which the attacker has to overcome to obtain the sensitive data, but at the same time our research shows that the severity level of the side-channel attacks threat for the mobile security is even more high then we can assume. The instrument available for the any potential malefactor, the consumer-level device, and realy simple technique of the trace gathering allow to distinguish the cryptographic operations in dependency on the used input data. Although on this equipment level the obtaining of the key data is not possible, the attacking algorythms designed during the our research will allow to reach this goal on the more detailed signal records.