U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home

Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels

Dataset for figures in the publication, "Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels," by V.V Iyer and J.D. Rezac (GLSVLSI 2024). The abstract for this publication is as follows: Unintentional electromagnetic (EM) emanations from general purpose embedded systems have been comprehensively studied as data recovery and monitoring tools for hardware security. While the potency of these physical side channels has been repeatedly demonstrated on embedded cryptosystems and microprocessors, limited work has been performed on judging their effectiveness in surveilling wireless communication between interconnected devices. This work uses EM side channels near a Bluetooth Low Energy (BLE) server to recover data received from a client. The method uses near-field EM scans to isolate on-chip locations susceptible to data leakage. At these locations, information leakage from a p-bit data value is partitioned into p bit-wise components. These components are individually and independently classified using SVMs trained on a novel side-channel metric. Only O(p^2) measurements and p bit-wise classifications are needed to identify which of the 2^p possible values has been received. The performance of the method is evaluated using the average recovery rate across bits in several unknown test data packets?a recovery rate of ? 96% was observed when the method was tested on a commercial BLE module.

About this Dataset

Updated: 2024-09-06
Metadata Last Updated: 2024-05-10 00:00:00
Date Created: N/A
Views:
Data Provided by:
Dataset Owner: N/A

Access this data

Contact dataset owner Landing Page URL
Download URL
Table representation of structured data
Title Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels
Description Dataset for figures in the publication, "Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels," by V.V Iyer and J.D. Rezac (GLSVLSI 2024). The abstract for this publication is as follows: Unintentional electromagnetic (EM) emanations from general purpose embedded systems have been comprehensively studied as data recovery and monitoring tools for hardware security. While the potency of these physical side channels has been repeatedly demonstrated on embedded cryptosystems and microprocessors, limited work has been performed on judging their effectiveness in surveilling wireless communication between interconnected devices. This work uses EM side channels near a Bluetooth Low Energy (BLE) server to recover data received from a client. The method uses near-field EM scans to isolate on-chip locations susceptible to data leakage. At these locations, information leakage from a p-bit data value is partitioned into p bit-wise components. These components are individually and independently classified using SVMs trained on a novel side-channel metric. Only O(p^2) measurements and p bit-wise classifications are needed to identify which of the 2^p possible values has been received. The performance of the method is evaluated using the average recovery rate across bits in several unknown test data packets?a recovery rate of ? 96% was observed when the method was tested on a commercial BLE module.
Modified 2024-05-10 00:00:00
Publisher Name National Institute of Standards and Technology
Contact mailto:[email protected]
Keywords Near-field metrology; side-channel security; BLE communication; wireless systems;
{
    "identifier": "ark:\/88434\/mds2-3176",
    "accessLevel": "public",
    "contactPoint": {
        "hasEmail": "mailto:[email protected]",
        "fn": "Vishnuvardhan Iyer"
    },
    "programCode": [
        "006:045"
    ],
    "landingPage": "https:\/\/data.nist.gov\/od\/id\/mds2-3176",
    "title": "Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels",
    "description": "Dataset for figures in the publication, \"Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels,\" by V.V Iyer and J.D. Rezac (GLSVLSI 2024). The abstract for this publication is as follows: Unintentional electromagnetic (EM) emanations from general purpose embedded systems have been comprehensively studied as data recovery and monitoring tools for hardware security. While the potency of these physical side channels has been repeatedly demonstrated on embedded cryptosystems and microprocessors, limited work has been performed on judging their effectiveness in surveilling wireless communication between interconnected devices. This work uses EM side channels near a Bluetooth Low Energy (BLE) server to recover data received from a client. The method uses near-field EM scans to isolate on-chip locations susceptible to data leakage. At these locations, information leakage from a p-bit data value is partitioned into p bit-wise components. These components are individually and independently classified using SVMs trained on a novel side-channel metric. Only O(p^2) measurements and p bit-wise classifications are needed to identify which of the 2^p possible values has been received. The performance of the method is evaluated using the average recovery rate across bits in several unknown test data packets?a recovery rate of ? 96% was observed when the method was tested on a commercial BLE module.",
    "language": [
        "en"
    ],
    "distribution": [
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig4c.csv",
            "description": "EM spatial map for value with hamming weight 8 at a time instance of maximum leakage. Different columns correspond to different horizontal spatial values. Different rows correspond to different vertical spatial values.",
            "mediaType": "text\/csv",
            "title": "Figure 4c"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig4d.csv",
            "description": "Spatial map of information leakage. Columns indicate different horizontal spatial locations. Rows indicate different vertical spatial locations.",
            "mediaType": "text\/csv",
            "title": "Figure 4d"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig6a.csv",
            "description": "Hamming weight dictionary signals. First column is frequency (MHz). Remaining columns are measured voltages (mV) for different hamming weights, and a test hamming weight, respectively.",
            "mediaType": "text\/csv",
            "title": "Figure 6a"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig6b.csv",
            "description": "Residual signals for bit 1 training. First column is frequency (MHz) and remaining are residual voltages (mV).",
            "mediaType": "text\/csv",
            "title": "Figure 6b"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig6c.csv",
            "description": "T-stat values on residual training signals. First column is frequency (MHz). Second is unitless t-stat.",
            "mediaType": "text\/csv",
            "title": "Figure 6c"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig6d_test1.csv",
            "description": "Distribution of residual functions across the 2 frequencies with the most prominent t-value. Comes from test data whose true bit is 1.",
            "mediaType": "text\/csv",
            "title": "Figure 6d - test data with true bit 1"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig6d_train0.csv",
            "description": "Distribution of residual functions across the 2 frequencies with the most prominent t-value. Comes from training data whose true bit is 0.",
            "mediaType": "text\/csv",
            "title": "Figure 6d - training data with true bit 0"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig4a.csv",
            "description": "Snippet of the decode window for the write operation. First column is time (microseconds). Second column is measured leakage voltage (mV) for a signal with hamming weight 0. Third column is the same with hamming weight 8.",
            "mediaType": "text\/csv",
            "title": "Figure 4a"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig4b.csv",
            "description": "Snippet of the decode window within the leakage interval. First column is time (ns). Second column is leakage voltage (mV) for a signal with hamming weight 0. Third is the same with hamming weight 8.",
            "mediaType": "text\/csv",
            "title": "Figure 4b"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_test0.csv",
            "mediaType": "text\/csv"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_test0.csv.sha256",
            "mediaType": "text\/plain"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_test1.csv",
            "mediaType": "text\/csv"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_test1.csv.sha256",
            "mediaType": "text\/plain"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_train0.csv",
            "mediaType": "text\/csv"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_train0.csv.sha256",
            "mediaType": "text\/plain"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_train1.csv",
            "mediaType": "text\/csv"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_train1.csv.sha256",
            "mediaType": "text\/plain"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/3176_README.txt",
            "mediaType": "text\/plain"
        },
        {
            "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/3176_README.txt.sha256",
            "mediaType": "text\/plain"
        }
    ],
    "bureauCode": [
        "006:55"
    ],
    "modified": "2024-05-10 00:00:00",
    "publisher": {
        "@type": "org:Organization",
        "name": "National Institute of Standards and Technology"
    },
    "theme": [
        "Advanced Communications:Wireless (RF)",
        "Mathematics and Statistics:Image and signal processing",
        "Information Technology:Privacy"
    ],
    "keyword": [
        "Near-field metrology; side-channel security; BLE communication; wireless systems;"
    ]
}

Was this page helpful?