From inception, side channel leakage has been widely used for the purposes of extracting secret information, such as cryptographic keys, from embedded devices. However, in a few instances it has been utilized for extracting other information about the internal state of a computing device. In this paper, we exploit side channel information to recover large parts of the Sykipot malware program executed on a smart card. We present the first methodology to recover the program code of a smart card malware by evaluating its power consumption only. Besides well-studied methods from side channel analysis, we apply a combination of dimensionality reduction techniques in the form of PCA and LDA models to compress the large amount of data generated while preserving as much variance of the original data as possible. Among feature extraction techniques, PCA and LDA are very common dimensionality reduction algorithms that have successfully been applied in many classification problems like face recognition, character recognition, speech recognition, etc. with the chief objective being to eliminate insignificant data (without losing too much information) during the pre-processing step. In addition to quantifying the potential of the created side channel based disassembler, we highlight its diverse and unique application scenarios.
Reference:
Djonon Tsague, H. and Twala, B. 2016. Reverse engineering smart card malware using side channel analysis with machine learning techniques. 2016 IEEE International Conference on Big Data (Big Data), 5-8 December 2016, Bethesda, MD, USA. DOI: 10.1109/BigData.2016.7841039
Djonon Tsague, H., & Twala, B. (2016). Reverse engineering smart card malware using side channel analysis with machine learning techniques. IEEE. http://hdl.handle.net/10204/9159
Djonon Tsague, Hippolyte, and B Twala. "Reverse engineering smart card malware using side channel analysis with machine learning techniques." (2016): http://hdl.handle.net/10204/9159
Djonon Tsague H, Twala B, Reverse engineering smart card malware using side channel analysis with machine learning techniques; IEEE; 2016. http://hdl.handle.net/10204/9159 .
Copyright: 2016 EE Publishers. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website.