ResearchSpace

Reverse engineering smart card malware using side channel analysis with machine learning techniques

Show simple item record

dc.contributor.author Djonon Tsague, Hippolyte
dc.contributor.author Twala, B
dc.date.accessioned 2017-06-07T07:08:01Z
dc.date.available 2017-06-07T07:08:01Z
dc.date.issued 2016-12
dc.identifier.citation Djonon Tsague, H. and Twala, B. 2016. Reverse engineering smart card malware using side channel analysis with machine learning techniques. 2016 IEEE International Conference on Big Data (Big Data), 5-8 December 2016, Bethesda, MD, USA. DOI: 10.1109/BigData.2016.7841039 en_US
dc.identifier.isbn 978-1-4673-9006-4
dc.identifier.uri http://ieeexplore.ieee.org/document/7841039/
dc.identifier.uri DOI: 10.1109/BigData.2016.7841039
dc.identifier.uri http://hdl.handle.net/10204/9159
dc.description Copyright: 2016 EE Publishers. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. en_US
dc.description.abstract From inception, side channel leakage has been widely used for the purposes of extracting secret information, such as cryptographic keys, from embedded devices. However, in a few instances it has been utilized for extracting other information about the internal state of a computing device. In this paper, we exploit side channel information to recover large parts of the Sykipot malware program executed on a smart card. We present the first methodology to recover the program code of a smart card malware by evaluating its power consumption only. Besides well-studied methods from side channel analysis, we apply a combination of dimensionality reduction techniques in the form of PCA and LDA models to compress the large amount of data generated while preserving as much variance of the original data as possible. Among feature extraction techniques, PCA and LDA are very common dimensionality reduction algorithms that have successfully been applied in many classification problems like face recognition, character recognition, speech recognition, etc. with the chief objective being to eliminate insignificant data (without losing too much information) during the pre-processing step. In addition to quantifying the potential of the created side channel based disassembler, we highlight its diverse and unique application scenarios. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.relation.ispartofseries Worklist;18736
dc.subject Side channel leakage en_US
dc.subject Electromagnetic templates en_US
dc.subject Principal components analysis en_US
dc.subject Linear discriminant analysis en_US
dc.subject Multivariate Gaussian distribution en_US
dc.subject k-Nearest neighbours algorithm en_US
dc.subject Reverse engineering en_US
dc.title Reverse engineering smart card malware using side channel analysis with machine learning techniques en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Djonon Tsague, H., & Twala, B. (2016). Reverse engineering smart card malware using side channel analysis with machine learning techniques. IEEE. http://hdl.handle.net/10204/9159 en_ZA
dc.identifier.chicagocitation Djonon Tsague, Hippolyte, and B Twala. "Reverse engineering smart card malware using side channel analysis with machine learning techniques." (2016): http://hdl.handle.net/10204/9159 en_ZA
dc.identifier.vancouvercitation Djonon Tsague H, Twala B, Reverse engineering smart card malware using side channel analysis with machine learning techniques; IEEE; 2016. http://hdl.handle.net/10204/9159 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Djonon Tsague, Hippolyte AU - Twala, B AB - From inception, side channel leakage has been widely used for the purposes of extracting secret information, such as cryptographic keys, from embedded devices. However, in a few instances it has been utilized for extracting other information about the internal state of a computing device. In this paper, we exploit side channel information to recover large parts of the Sykipot malware program executed on a smart card. We present the first methodology to recover the program code of a smart card malware by evaluating its power consumption only. Besides well-studied methods from side channel analysis, we apply a combination of dimensionality reduction techniques in the form of PCA and LDA models to compress the large amount of data generated while preserving as much variance of the original data as possible. Among feature extraction techniques, PCA and LDA are very common dimensionality reduction algorithms that have successfully been applied in many classification problems like face recognition, character recognition, speech recognition, etc. with the chief objective being to eliminate insignificant data (without losing too much information) during the pre-processing step. In addition to quantifying the potential of the created side channel based disassembler, we highlight its diverse and unique application scenarios. DA - 2016-12 DB - ResearchSpace DP - CSIR KW - Side channel leakage KW - Electromagnetic templates KW - Principal components analysis KW - Linear discriminant analysis KW - Multivariate Gaussian distribution KW - k-Nearest neighbours algorithm KW - Reverse engineering LK - https://researchspace.csir.co.za PY - 2016 SM - 978-1-4673-9006-4 T1 - Reverse engineering smart card malware using side channel analysis with machine learning techniques TI - Reverse engineering smart card malware using side channel analysis with machine learning techniques UR - http://hdl.handle.net/10204/9159 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record