This lesson is still being designed and assembled (Pre-Alpha version)

Side Channel Attacks using Electromagnetic Emissions

Overview

Teaching: 50 min
Exercises: 0 min
Questions
  • Key question (FIXME)

Objectives
  • First learning objective. (FIXME)

Side-Channel Attacks Using Electromagnetic (EM) Emissions

1. Introduction to Side-Channel Attacks (SCAs)

Side-channel attacks (SCAs) exploit unintended physical emissions from electronic devices to extract sensitive information such as cryptographic keys, passwords, or data being processed. Among the various types of SCAs, electromagnetic (EM) emissions attacks are particularly concerning because they can be conducted remotely and non-invasively.

πŸ”΄ Why Are EM Emissions a Security Risk?

πŸ“‘ Common Targets:


2. How Electromagnetic Side-Channel Attacks Work

2.1 Principles of EM Emission Attacks

Every electronic device produces unintentional electromagnetic (EM) signals due to the switching of transistors and power fluctuations. By capturing these signals using specialized hardware, an attacker can infer:

βœ” Encryption keys from cryptographic processors
βœ” Keystrokes from keyboards (remote keylogging)
βœ” Data from air-gapped systems
βœ” Screen contents from unshielded monitors

2.2 Attack Process

1️⃣ Signal Collection

2️⃣ Signal Processing

3️⃣ Data Extraction


3. Types of Electromagnetic Side-Channel Attacks

3.1 Cryptographic Key Extraction Attacks

πŸ”Ή Principle: Extract secret cryptographic keys from electromagnetic emissions of hardware performing encryption.

Attack Type Targeted Algorithm Impact
TEMPEST (Van Eck Phreaking) RSA, AES, ECC, DES Extracts private keys from CPUs & FPGAs
Simple EM Analysis (SEMA) AES, RSA Reads EM fluctuations to infer key operations
Differential EM Analysis (DEMA) AES, ECC Uses statistical correlation to recover full keys

πŸ“Œ Example:

βœ… Defense:
βœ” Electromagnetic shielding (Faraday cages, TEMPEST-rated enclosures)
βœ” Side-channel hardened cryptographic algorithms
βœ” Randomized power consumption (masking techniques)


3.2 Keystroke & Data Leakage Attacks

πŸ”Ή Principle: Capture unintended EM emissions from keyboards, monitors, or processors to recover sensitive information.

Attack Type Targeted Device Impact
Keystroke Emanation Attack Wired & Wireless Keyboards Remote keylogging via RF analysis
Monitor Emanation Attack LCD/CRT Screens Reads screen contents from RF emissions
Processor Timing Attack CPUs Infers processed data based on EM fluctuations

πŸ“Œ Example:

βœ… Defense:
βœ” Use shielded keyboards (e.g., military-grade TEMPEST keyboards)
βœ” Employ randomized keyboard signal processing
βœ” Use noise generation to obfuscate real signals


3.3 Air-Gap Bypass Attacks Using EM Emissions

πŸ”Ή Principle: Extract data from air-gapped computers by exploiting electromagnetic emissions.

Attack Type How It Works Impact
AirHopper Attack Uses VGA cable emissions to transmit data to a nearby attacker Leaks sensitive screen data from air-gapped systems
GSMem Attack Uses memory bus EM emissions to send data to a nearby mobile phone Exfiltrates classified data from air-gapped networks
TempestSDR Attack Uses Software-Defined Radio (SDR) to capture leaked data Extracts information from isolated computers

πŸ“Œ Example:

βœ… Defense:
βœ” Use TEMPEST-certified shielding for sensitive environments
βœ” Deploy RF jamming & anomaly detection for unauthorized emissions
βœ” Monitor and control unauthorized hardware connections


4. Tools Used in EM Side-Channel Attacks

Tool Purpose
HackRF One Captures and transmits RF signals
Software-Defined Radios (RTL-SDR, USRP, LimeSDR) EM signal eavesdropping and analysis
TEMPESTSDR Decodes leaked electromagnetic emissions from monitors
Open-source tools (ChipWhisperer, Riscure Inspector) Cryptographic side-channel analysis

5. Countermeasures Against EM Side-Channel Attacks

πŸ”’ Hardware-Level Protections
βœ” Use electromagnetic shielding (Faraday cages, conductive enclosures).
βœ” Employ power and signal masking techniques to prevent leakage.
βœ” Implement randomized execution patterns in cryptographic algorithms.

πŸ”’ Software-Level Protections
βœ” Use constant-time cryptographic computations to avoid EM leakage.
βœ” Implement noise injection & signal obfuscation techniques.

πŸ”’ Network & Physical Security
βœ” Deploy RF jamming and spectrum monitoring systems.
βœ” Restrict the use of unsecured wireless peripherals (Bluetooth, RFID, NFC).


6. Conclusion

Electromagnetic side-channel attacks pose a serious cybersecurity risk to cryptographic systems, secure computing environments, and air-gapped networks. Attackers can extract encryption keys, passwords, and sensitive data using passive EM monitoring or active RF probing.

βœ… Key Takeaways:

πŸ“‘ Next Steps: Would you like a detailed breakdown of TEMPEST attacks, real-world case studies, or hands-on demonstrations with SDR tools? πŸš€

Key Points

  • First key point. Brief Answer to questions. (FIXME)