Abstract
Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditional side-channel attacks, such as power analysis attacks and electromagnetic analysis attacks, required physical presence of the attacker as well as expensive equipment, an (unprivileged) application is all it takes to exploit the leaking information on modern mobile devices. Given the vast amount of sensitive information that are stored on smartphones, the ramifications of side-channel attacks affect both the security and privacy of users and their devices. In this paper, we propose a new categorization system for side-channel attacks, which is necessary as side-channel attacks have evolved significantly since their scientific investigations during the smart card era in the 1990s. Our proposed classification system allows to analyze side-channel attacks systematically, and facilitates the development of novel countermeasures. Besides this new categorization system, the extensive survey of existing attacks and attack strategies provides valuable insights into the evolving field of side-channel attacks, especially when focusing on mobile devices. We conclude by discussing open issues and challenges in this context and outline possible future research directions.
Original language | English |
---|---|
Pages (from-to) | 465-488 |
Number of pages | 24 |
Journal | IEEE Communications Surveys and Tutorials |
Volume | 20 |
Issue number | 1 |
DOIs | |
Publication status | Published - 1 Jan 2018 |
Externally published | Yes |
Funding
Manuscript received February 3, 2017; revised June 23, 2017 and October 4, 2017; accepted November 18, 2017. Date of publication December 4, 2017; date of current version February 26, 2018. This work was supported in part by the European Union’s Horizon 2020 Research and Innovation Programme (HECTOR) under Grant 644052, and in part by the European Research Council through the European Union’s Horizon 2020 Research and Innovation Programme under Grant 681402. The work of V. Moonsamy was supported by the Technology Foundation STW (TYPHOON & ASPASIA) through the Dutch Government under Project 13499. (Corresponding author: Raphael Spreitzer.) R. Spreitzer and S. Mangard are with the IAIK, Graz University of Technology, 8010 Graz, Austria (e-mail: [email protected]; [email protected]).
Keywords
- Android
- classification
- information leakage
- mobile devices
- Side-channel attacks
- smartphones
- survey