Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Researchers discover new side channel attack on low-end phones
https://techxplore.com ^ | 30 SEPTEMBER 2021 | by Georgia Institute of Technology

Posted on 10/01/2021 8:27:05 AM PDT by Red Badger

Georgia Tech Researchers have now shown that one of the very measures meant to keep data secure on a low-end phone can enable attackers to steal it.

Their paper, presented on September 10 at the 6th IEEE European Symposium on Security and Privacy, demonstrates successful attacks on two different types of low-end Android phones, a ZTE Zfive and an Alcatel Ideal. In accordance with standard practice, the researchers reported their findings to software developers before releasing their results so that the problem could be fixed.

The attack relies on placing a radio sensor within a few centimeters of a device, close enough to detect the weak radio waves that are inadvertently emitted by a phone's processor. By witnessing a single secure web transaction transmitted in these signals, an attacker can figure out a user's secret key, a form of numerical password that is used to encrypt their data.

"It demonstrates that a really powerful attack, one that can actually steal the key, can be done under realistic conditions," said Milos Prvulovic, professor of Computer Science at Georgia Tech and coauthor of the study. "How many times have you put your phone down on a desk at the airport and not checked what's under the desk?"

Fortunately, the researchers found a relatively straightforward fix. Implementing this fix is currently in progress, and will be important. If researchers can figure out how to make the attack work on high-end phones, then the same vulnerability will occur on billions of the most widely-used modern devices.

Hacking a phone from the side

Secret keys or encryption keys are often used for securing user data. Once the attacker has access to a user's encryption keys, they can forge their "digital signature" and gain access to banking data, for example. Because the newly discovered attack should work on a wide variety of phones in everyday use, it is expected to require prompt amendment to the relevant security standards, RFC 7748.

The attack targets a standard encryption process employed in a wide range of online activities, such as logging into a virtual private network (VPN), creating a secure web connection with a bank, or e-signing a digital document. During this process, two endpoints on a network, such as two phones, must exchange a series of messages to verify each other's identity. If they cannot verify that they are who they say they are, then they know not to send private data.

Proving one's identity amounts to carrying out a certain kind of encryption algorithm. This algorithm involves a series of operations on a secret key called a "nonce," which can be represented as a binary number, a sequence of ones and zeroes or "bits." For each operation that a phone's processor carries out, it emits a weak radio signal, thousands of times weaker than the signal of a Wi-Fi transmitter. These signals are called "side-channel" emissions since they do not come from the primary channels that the phone uses to communicate.

VIDEO AT LINK...............

Years ago, researchers realized that these side-channel emissions can leak the value of the nonce. For example, an encryption algorithm might require additional processing steps when a bit of the nonce is a one, making the processor emit a longer lasting signal for those bits. By tracking the pattern of longer and shorter emissions that come from the phone while it is processing the nonce, an attacker can reconstruct the value of each of its bits. From there, they can break a user's encryption.

Other researchers invented a solution for this problem known as a "constant-time" algorithm. This algorithm ensures that a processor carries out the same sequence of operations for each bit. The radio emissions are therefore indistinguishable for each bit and the nonce cannot be reconstructed. This algorithm was codified in encryption standards like RFC 7748 and widely adopted.

Breaking the constant-time algorithm

In the new work, the researchers discovered a problem with the constant-time algorithm. One particular operation that is carried out for each bit, called a "conditional swap," has a tell-tale trait. When the operation is performed on a bit with the value of one, the processor emits a slightly stronger radio signal. The researchers realized that if an attacker could listen in on the emissions during this operation, each time it occurs, they could determine the nonce.

The hard part was to figure out whether they could focus in on the specific radio signature of the conditional swap, buried within a sequence of many other emissions. Also, because of the high processing speed of modern phones, the radio signature of the conditional swap only lasts for a brief duration. But, it turns out, it is the constant-time algorithm—meant to be a countermeasure to side-channel attacks—which allows the attack to work in the first place.

The key for the researchers was to carefully observe a phone's emissions. Because of the constant-time algorithm, these emissions are extremely regular. Each time the phone processes a bit, the same general pattern of emissions takes place. The researchers could therefore automate the process of picking out the tiny piece of emissions corresponding to the conditional swap, like learning to spot a small logo on a fast-moving train car by watching enough train cars passing by. From there, the researchers could measure the strength of the emissions to determine whether each bit was a zero or one, and thereby reconstruct the entire nonce.

The attack works so effectively that researchers found they only needed to listen in on a single secure transaction to steal a phone's secret key.

"As long as somebody can put a probe or antenna close enough," said Prvulovic, "We can have your key now."

To fix the issue, the researchers modified the constant-time algorithm so that the signal corresponding to the conditional swap has the same strength regardless of the value of the bit. After developers implement this fix into cryptographic libraries like OpenSSL, the constant-time algorithm should be secure once again.

Explore further

A backdoor in mobile phone encryption from the '90s still exists

More information:

A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms. Monjur Alam, Baki Yilmaz and Frank Werner (Georgia Tech); Niels Samwel (Radboud University); Alenka Zajic (Georgia tech); Daniel Genkin (University of Michigan); Yuval Yarom (University of Adelaide and Data61); Milos Prvulovic (Georgia Tech). 6th IEEE European Symposium on Security and Privacy, September 6-10, 2021.

Provided by Georgia Institute of Technology


TOPICS: Business/Economy; Computers/Internet; Military/Veterans; Society
KEYWORDS: android; apple; iphone; mobilephones

1 posted on 10/01/2021 8:27:06 AM PDT by Red Badger
[ Post Reply | Private Reply | View Replies]

To: ShadowAce; Swordmaker; dayglored; bitt

Pingy!...................


2 posted on 10/01/2021 8:27:33 AM PDT by Red Badger (Homeless veterans camp in the streets while illegal aliens are put up in hotels.....................)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

As a security pentester, it is far more concerning to me that a bug has been found in the Azure AD implementation that allows brute force password cracking - WITHOUT DETECTION!

If you oversee a cloud implementation that uses Azure AD, please, please implement dual factor authentication ASAP.


3 posted on 10/01/2021 8:35:51 AM PDT by taxcontrol (The choice is clear - either live as a slave on your knees or die as a free citizen on your feet.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

So how do they separate signals from multiple phones in one area? I know lots of people who just use a simple flip phone (like I do) - sounds like the same thing with credit cards stacked up in your wallet and supposedly idividually read somehow.


4 posted on 10/01/2021 8:45:32 AM PDT by SkyDancer (How Can I Ask For Forgiveness If I Won't Forgive Others?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Red Badger

Welp, gonna need to Tempest-ize those cheap phones!

https://en.wikipedia.org/wiki/Tempest_(codename)

William Van Eck, you are a visionary...


5 posted on 10/01/2021 8:54:23 AM PDT by bigbob
[ Post Reply | Private Reply | To 1 | View Replies]

To: bigbob

For those interested in what I’m talking about:

https://youtu.be/mcV6izFG3vQ


6 posted on 10/01/2021 9:01:08 AM PDT by bigbob
[ Post Reply | Private Reply | To 5 | View Replies]

To: bigbob

Do you know how hard that is?

And expensive?.

A Tempest-ized phone would be at least $50k..................


7 posted on 10/01/2021 9:06:56 AM PDT by Red Badger (Homeless veterans camp in the streets while illegal aliens are put up in hotels.....................)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Red Badger

I worked on a bid for Tempest stuff in the 70s. I couldn’t get the NACSEM 5100 spec,and raised hell with my contact at the prime contractor. I got a call from someone working for a three letter agency suggesting that since I lacked “need to know” that a no-bid response would be appropriate. Which was kind of a shame because we had some good technology.

“Tempest for Every Office”: https://cryptome.org/2013/03/nsa-tempest-again.pdf


8 posted on 10/01/2021 9:20:58 AM PDT by bigbob
[ Post Reply | Private Reply | To 7 | View Replies]

To: bigbob

Just the TESTING for to see if the finished equipment meets the TEMPEST specs is expensive as hell.................


9 posted on 10/01/2021 9:25:03 AM PDT by Red Badger (Homeless veterans camp in the streets while illegal aliens are put up in hotels.....................)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Red Badger

Yep, and when the emitter is the size of a mobile phone the emissions are that much weaker, which is why the antenna has to be very close vs across the room or out in the parking lot like the Van Eck Phreakers demonstrate. So let’s see... how could we put an antenna in close proximity to a mobile phone? Ah, everyone loves wireless charging and NFC! Not saying anyone is doing that, but unintended consequences sometimes follow purchase of a neat high-tech toy, espy from Chinese sources.

BTW Cryptolog is not a fanzine, it was an official internal NSA publication from 1974 to 1997. It contained everything from brain teasers to UNIX shell tutorials but mainly highlighted some internal discussions going on between intelligence agencies. (Nowadays it would just be about Trump).


10 posted on 10/01/2021 9:32:34 AM PDT by bigbob
[ Post Reply | Private Reply | To 9 | View Replies]

To: bigbob

Wifi, Bluetooth, Wireless Charging, Fake VPNs, ApplePay, VISA, the possibilities are endless.................


11 posted on 10/01/2021 9:36:27 AM PDT by Red Badger (Homeless veterans camp in the streets while illegal aliens are put up in hotels.....................)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Red Badger

Just one of many reasons why I use a flip phone rather than a smartphone.


12 posted on 10/01/2021 9:53:27 AM PDT by allblues (God is neither a Republican nor a Democrat but Satan is definitely a Democrat)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson