Paper 2025/617

Multi-Screaming-Channel Attacks: Frequency Diversity for Enhanced Attacks

Jeremy Guillaume, Université Bretagne Sud, French National Centre for Scientific Research, Lab-STICC
Maxime Pelcat, Institut National des Sciences Appliquées de Rouen, French National Centre for Scientific Research, IETR
Amor Nafkha, CentraleSupélec, French National Centre for Scientific Research, IETR
Ruben Salvador, CentraleSupélec, Inria Rennes - Bretagne Atlantique Research Centre, French National Centre for Scientific Research, Institut de Recherche en Informatique et Systèmes Aléatoires
Abstract

Side-channel attacks consist of retrieving internal data from a victim system by analyzing its leakage, which usually requires proximity to the victim in the range of a few millimetres. Screaming channels are EM side channels transmitted at a distance of a few meters. They appear on mixed-signal devices integrating an RF module on the same silicon die as the digital part. Consequently, the side channels are modulated by legitimate RF signal carriers and appear at the harmonics of the digital clock frequency. While initial works have only considered collecting leakage at these harmonics, late work has demonstrated that the leakage is also present at frequencies other than these harmonics. This result significantly increases the number of available frequencies to perform a screaming-channel attack, which can be convenient in an environment where multiple harmonics are polluted. This work studies how this diversity of frequencies carrying leakage can be used to improve attack performance. We first study how to combine multiple frequencies. Second, we demonstrate that frequency combination can improve attack performance and evaluate this improvement according to the performance of the combined frequencies. Finally, we demonstrate the interest of frequency combination in attacks at and, for the first time to the best of our knowledge, at meters. One last important observation is that this frequency combination divides by the number of traces needed to reach a given attack performance.

Note: Submitted to IEEE Transactions on Information Forensics and Security (IEEE TIFS)

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
side-channel attacksEM side channelsscreaming channel attacksmulti-channel attacks
Contact author(s)
jeremy guillaume @ univ-ubs fr
maxime pelcat @ insa-rennes fr
amor nafkha @ centralesupelec fr
ruben salvador @ inria fr
History
2025-04-11: approved
2025-04-04: received
See all versions
Short URL
https://ia.cr/2025/617
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/617,
      author = {Jeremy Guillaume and Maxime Pelcat and Amor Nafkha and Ruben Salvador},
      title = {Multi-Screaming-Channel Attacks: Frequency Diversity for Enhanced Attacks},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/617},
      year = {2025},
      url = {https://eprint.iacr.org/2025/617}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.