Breaking ECDSA with Electromagnetic Side-Channel Attacks: Challenges and Practicality on Modern Smartphones

📅 2025-12-08
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work systematically evaluates the vulnerability of modern smartphones—equipped with advanced SoCs (sub-10 nm process, heterogeneous cores, >2 GHz clock speeds) since 2019—to electromagnetic side-channel attacks (EM-SCA) during ECDSA signing. We propose a novel EM-SCA methodology tailored to complex SoC architectures and integrate it with the Nonce@Once attack paradigm. Our empirical evaluation successfully recovers ECDSA private keys from OpenSSL and libgcrypt implementations on Raspberry Pi 4 and Fairphone 4. Results demonstrate that purely software-based cryptographic implementations on general-purpose processors remain fundamentally insecure against physical side-channel threats—particularly critical in high-assurance applications such as electronic identity (e.g., EUDI Wallet). Key contributions include: (1) establishing a realistic EM-SCA threat model for contemporary mobile platforms; (2) empirically validating the practical exploitability of widely deployed cryptographic libraries; and (3) substantiating the necessity and urgency of hardware-isolated secure elements (SEs) at the endpoint layer for robust authentication security.

Technology Category

Application Category

📝 Abstract
Smartphones handle sensitive tasks such as messaging and payment and may soon support critical electronic identification through initiatives such as the European Digital Identity (EUDI) wallet, currently under development. Yet the susceptibility of modern smartphones to physical side-channel analysis (SCA) is underexplored, with recent work limited to pre-2019 hardware. Since then, smartphone system on chip (SoC) platforms have grown more complex, with heterogeneous processor clusters, sub 10 nm nodes, and frequencies over 2 GHz, potentially complicating SCA. In this paper, we assess the feasibility of electromagnetic (EM) SCA on a Raspberry Pi 4, featuring a Broadcom BCM2711 SoC and a Fairphone 4 featuring a Snapdragon 750G 5G SoC. Using new attack methodologies tailored to modern SoCs, we recover ECDSA secrets from OpenSSL by mounting the Nonce@Once attack of Alam et al. (Euro S&P 2021) and show that the libgcrypt countermeasure does not fully mitigate it. We present case studies illustrating how hardware and software stacks impact EM SCA feasibility. Motivated by use cases such as the EUDI wallet, we survey Android cryptographic implementations and define representative threat models to assess the attack. Our findings show weaknesses in ECDSA software implementations and underscore the need for independently certified secure elements (SEs) in all smartphones.
Problem

Research questions and friction points this paper is trying to address.

Assess electromagnetic side-channel attack feasibility on modern smartphones
Recover ECDSA secrets using new methodologies tailored to modern SoCs
Identify weaknesses in ECDSA implementations and need for secure elements
Innovation

Methods, ideas, or system contributions that make the work stand out.

Electromagnetic side-channel attacks on modern smartphone SoCs
Nonce@Once attack on ECDSA in OpenSSL and libgcrypt
Hardware and software stack analysis for vulnerability assessment
🔎 Similar Papers
F
Felix Oberhansl
Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany
M
Marc Schink
Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany; Technical University of Munich (TUM), Munich, Germany
N
Nisha Jacob Kabakci
Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany
M
Michael Gruber
Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany
Dominik Klein
Dominik Klein
German Federal Office for Information Security (BSI), Bonn, Germany
S
Sven Freud
German Federal Office for Information Security (BSI), Bonn, Germany
Tobias Damm
Tobias Damm
Professor for Systems and Control Theory, RPTU Kaiserslautern-Landau, Germany
systems and controlapplied linear algebra
M
Michael Hartmeier
Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany
I
Ivan Gavrilan
Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany; Technical University of Munich (TUM), Munich, Germany
S
Silvan Streit
Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany; Technical University of Munich (TUM), Munich, Germany
J
Jonas Stappenbeck
Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany
A
Andreas Seelos Zankl
Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany; Technical University of Munich (TUM), Munich, Germany