31
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Side-channel attacks on mobile devices have gained increasing attention since their introduction in 2007. While traditional side-channel attacks, such as power analysis attacks and electromagnetic analysis attacks, required physical presence of the attacker as well as expensive equipment, an (unprivileged) application is all it takes to exploit the leaking information on modern mobile devices. Given the vast amount of sensitive information that are stored on smartphones, the ramifications of side-channel attacks affect both the security and privacy of users and their devices. In this paper, we propose a new categorization system for side-channel attacks on mobile devices, which is necessary since side-channel attacks have evolved significantly since their introduction during the smartcard era. Our proposed classification system allows to analyze side-channel attacks systematically, and facilitates the development of novel countermeasures. Besides this new categorization system, the extensive overview of existing attacks and attack strategies provides valuable insights on the evolving field of side-channel attacks on mobile devices. We conclude by discussing open issues and challenges in this context and outline possible future research directions.

          Related collections

          Most cited references24

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          On the Importance of Checking Cryptographic Protocols for Faults

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            A survey of covert channels and countermeasures in computer network protocols

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Survey on Security for Mobile Devices

                Bookmark

                Author and article information

                Journal
                2016-11-11
                Article
                1611.03748
                64a7da73-8b8c-4749-96ac-a1a1b60ac151

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article