Paper 2025/020

ProbeShooter: A New Practical Approach for Probe Aiming

Daehyeon Bae, Korea University
Sujin Park, Korea University
Minsig Choi, Korea University
Young-Giu Jung, YM-NaeulTech.
Changmin Jeong, Agency for Defense Development
Heeseok Kim, Korea University
Seokhie Hong, Korea University
Abstract

Electromagnetic side-channel analysis is a powerful method for monitoring processor activity and compromising cryptographic systems in air-gapped environments. As analytical methodologies and target devices evolve, the importance of leakage localization and probe aiming becomes increasingly apparent for capturing only the desired signals with a high signal-to-noise ratio. Despite its importance, there remains substantial reliance on unreliable heuristic approaches and inefficient exhaustive searches. Furthermore, related studies often fall short in terms of feasibility, practicality, and performance, and are limited to controlled DUTs and low-end MCUs. To address the limitations and inefficiencies of the previous approaches, we propose a novel methodology―${\rm P{\tiny ROBE}S{\tiny HOOTER}}$―for leakage localization and probe aiming. This approach leverages new insights into the spatial characteristics of amplitude modulation and intermodulation distortion in processors. As a result, ${\rm P{\tiny ROBE}S{\tiny HOOTER}}$ provides substantial improvements in various aspects: $\boldsymbol 1)$ it is applicable to not only simple MCUs but also complex SoCs, $\boldsymbol 2)$ it effectively handles multi-core systems and dynamic frequency scaling, $\boldsymbol 3)$ it is adoptable to uncontrollable DUTs, making it viable for constrained real-world attacks, and $\boldsymbol 4)$ it performs significantly faster than previous methods. To demonstrate this, we experimentally evaluate ${\rm P{\tiny ROBE}S{\tiny HOOTER}}$ on a high-end MCU (the NXP i.MX RT1061 featuring a single ARM Cortex-M7 core) and a complex SoC (the Broadcom BCM2711 equipped with the Raspberry Pi 4 Model B, featuring four ARM Cortex-A72 cores).

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. ASIA CCS '25
DOI
10.1145/3708821.3710815
Keywords
Hardware securityElectromagnetic side-channel analysisLeakage localizationCartography
Contact author(s)
dh_bae @ korea ac kr
lemontrees33 @ korea ac kr
minsigchoi0527 @ korea ac kr
youngq jung @ ym-naeultech com
min @ add re kr
80khs @ korea ac kr
shhong @ korea ac kr
History
2025-01-08: revised
2025-01-06: received
See all versions
Short URL
https://ia.cr/2025/020
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/020,
      author = {Daehyeon Bae and Sujin Park and Minsig Choi and Young-Giu Jung and Changmin Jeong and Heeseok Kim and Seokhie Hong},
      title = {{ProbeShooter}: A New Practical Approach for Probe Aiming},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/020},
      year = {2025},
      doi = {10.1145/3708821.3710815},
      url = {https://eprint.iacr.org/2025/020}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.