A New Type of Timing Attack: Application to GPS
نویسندگان
چکیده
We investigate side-channel attacks where the attacker only needs the Hamming weights of several secret exponents to guess a longterm secret. Such weights can often be recovered by SPA, EMA, or simply timing attack. We apply this principle to propose a timing attack on the GPS identification scheme. We consider implementations of GPS where the running time of the exponentiation (commitment phase) leaks the exponent’s Hamming weight, which is typical of a square and multiply algorithm for example. We show that only 800 time measures allow the attacker to find the private key in a few seconds on a PC with a success probability of 80%. Besides its efficiency, two other interesting points in our attack are its resistance to some classical countermeasures against timing attacks, and the fact that it works whether the Chinese Remainder Technique is used or not.
منابع مشابه
Application of New Techniques to Monitor Livestock Grazing Distribution by GPS and GIS
Range management needs information on distribution of livestock. The better the distribution of the livestock, the more uniform the use of the rangeland. This study was conducted to record the path of the herd steering by the shepherd. A GPS was attached to a three year old ewe which was moving with the flock. The path of flock movement was recorded for three years on a monthly basis during the...
متن کاملA Wavelet-based Spoofing Error Compensation Technique for Single Frequency GPS Stationary Receiver
Spoofing could pose a major threat to Global Positioning System (GPS) navigation, so the GPS users have to gain an in-depth understanding of GPS spoofing. Since spoofing attack can influence position results, spoof compensation is possible through reducing position deviations. In this paper, a novel processing technique is proposed and the wavelet transform is used to eliminate the impact of sp...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملInterference Mitigation of Replay Attacks in GPS Receiver using of Finite Impulse Response Filter
The vulnerability of civil GPS receiver to interference may be intentional or unintentional. Among all types of interference, replay attack intended as the most dangerous intentional one. The signal structure of replay attack is almost the same with the satellite signal. The interference effects can be reduce with the design of an appropriate filter in the receiver. This paper presents two meth...
متن کاملTime Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis
Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for prec...
متن کامل