Dataset for figures in the publication, "Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels," by V.V Iyer and J.D. Rezac (GLSVLSI 2024). The abstract for this publication is as follows: Unintentional electromagnetic (EM) emanations from general purpose embedded systems have been comprehensively studied as data recovery and monitoring tools for hardware security. While the potency of these physical side channels has been repeatedly demonstrated on embedded cryptosystems and microprocessors, limited work has been performed on judging their effectiveness in surveilling wireless communication between interconnected devices. This work uses EM side channels near a Bluetooth Low Energy (BLE) server to recover data received from a client. The method uses near-field EM scans to isolate on-chip locations susceptible to data leakage. At these locations, information leakage from a p-bit data value is partitioned into p bit-wise components. These components are individually and independently classified using SVMs trained on a novel side-channel metric. Only O(p^2) measurements and p bit-wise classifications are needed to identify which of the 2^p possible values has been received. The performance of the method is evaluated using the average recovery rate across bits in several unknown test data packets?a recovery rate of ? 96% was observed when the method was tested on a commercial BLE module.
About this Dataset
Title | Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels |
---|---|
Description | Dataset for figures in the publication, "Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels," by V.V Iyer and J.D. Rezac (GLSVLSI 2024). The abstract for this publication is as follows: Unintentional electromagnetic (EM) emanations from general purpose embedded systems have been comprehensively studied as data recovery and monitoring tools for hardware security. While the potency of these physical side channels has been repeatedly demonstrated on embedded cryptosystems and microprocessors, limited work has been performed on judging their effectiveness in surveilling wireless communication between interconnected devices. This work uses EM side channels near a Bluetooth Low Energy (BLE) server to recover data received from a client. The method uses near-field EM scans to isolate on-chip locations susceptible to data leakage. At these locations, information leakage from a p-bit data value is partitioned into p bit-wise components. These components are individually and independently classified using SVMs trained on a novel side-channel metric. Only O(p^2) measurements and p bit-wise classifications are needed to identify which of the 2^p possible values has been received. The performance of the method is evaluated using the average recovery rate across bits in several unknown test data packets?a recovery rate of ? 96% was observed when the method was tested on a commercial BLE module. |
Modified | 2024-05-10 00:00:00 |
Publisher Name | National Institute of Standards and Technology |
Contact | mailto:[email protected] |
Keywords | Near-field metrology; side-channel security; BLE communication; wireless systems; |
{ "identifier": "ark:\/88434\/mds2-3176", "accessLevel": "public", "contactPoint": { "hasEmail": "mailto:[email protected]", "fn": "Vishnuvardhan Iyer" }, "programCode": [ "006:045" ], "landingPage": "https:\/\/data.nist.gov\/od\/id\/mds2-3176", "title": "Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels", "description": "Dataset for figures in the publication, \"Using EM Side-Channels Near a Bluetooth Server Implementation to Monitor Bit-Level Leakages in BLE Communications Channels,\" by V.V Iyer and J.D. Rezac (GLSVLSI 2024). The abstract for this publication is as follows: Unintentional electromagnetic (EM) emanations from general purpose embedded systems have been comprehensively studied as data recovery and monitoring tools for hardware security. While the potency of these physical side channels has been repeatedly demonstrated on embedded cryptosystems and microprocessors, limited work has been performed on judging their effectiveness in surveilling wireless communication between interconnected devices. This work uses EM side channels near a Bluetooth Low Energy (BLE) server to recover data received from a client. The method uses near-field EM scans to isolate on-chip locations susceptible to data leakage. At these locations, information leakage from a p-bit data value is partitioned into p bit-wise components. These components are individually and independently classified using SVMs trained on a novel side-channel metric. Only O(p^2) measurements and p bit-wise classifications are needed to identify which of the 2^p possible values has been received. The performance of the method is evaluated using the average recovery rate across bits in several unknown test data packets?a recovery rate of ? 96% was observed when the method was tested on a commercial BLE module.", "language": [ "en" ], "distribution": [ { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig4c.csv", "description": "EM spatial map for value with hamming weight 8 at a time instance of maximum leakage. Different columns correspond to different horizontal spatial values. Different rows correspond to different vertical spatial values.", "mediaType": "text\/csv", "title": "Figure 4c" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig4d.csv", "description": "Spatial map of information leakage. Columns indicate different horizontal spatial locations. Rows indicate different vertical spatial locations.", "mediaType": "text\/csv", "title": "Figure 4d" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig6a.csv", "description": "Hamming weight dictionary signals. First column is frequency (MHz). Remaining columns are measured voltages (mV) for different hamming weights, and a test hamming weight, respectively.", "mediaType": "text\/csv", "title": "Figure 6a" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig6b.csv", "description": "Residual signals for bit 1 training. First column is frequency (MHz) and remaining are residual voltages (mV).", "mediaType": "text\/csv", "title": "Figure 6b" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig6c.csv", "description": "T-stat values on residual training signals. First column is frequency (MHz). Second is unitless t-stat.", "mediaType": "text\/csv", "title": "Figure 6c" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig6d_test1.csv", "description": "Distribution of residual functions across the 2 frequencies with the most prominent t-value. Comes from test data whose true bit is 1.", "mediaType": "text\/csv", "title": "Figure 6d - test data with true bit 1" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig6d_train0.csv", "description": "Distribution of residual functions across the 2 frequencies with the most prominent t-value. Comes from training data whose true bit is 0.", "mediaType": "text\/csv", "title": "Figure 6d - training data with true bit 0" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig4a.csv", "description": "Snippet of the decode window for the write operation. First column is time (microseconds). Second column is measured leakage voltage (mV) for a signal with hamming weight 0. Third column is the same with hamming weight 8.", "mediaType": "text\/csv", "title": "Figure 4a" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/mds2-3176\/Fig4b.csv", "description": "Snippet of the decode window within the leakage interval. First column is time (ns). Second column is leakage voltage (mV) for a signal with hamming weight 0. Third is the same with hamming weight 8.", "mediaType": "text\/csv", "title": "Figure 4b" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_test0.csv", "mediaType": "text\/csv" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_test0.csv.sha256", "mediaType": "text\/plain" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_test1.csv", "mediaType": "text\/csv" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_test1.csv.sha256", "mediaType": "text\/plain" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_train0.csv", "mediaType": "text\/csv" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_train0.csv.sha256", "mediaType": "text\/plain" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_train1.csv", "mediaType": "text\/csv" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/Fig6d_train1.csv.sha256", "mediaType": "text\/plain" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/3176_README.txt", "mediaType": "text\/plain" }, { "downloadURL": "https:\/\/data.nist.gov\/od\/ds\/ark:\/88434\/mds2-3176\/3176_README.txt.sha256", "mediaType": "text\/plain" } ], "bureauCode": [ "006:55" ], "modified": "2024-05-10 00:00:00", "publisher": { "@type": "org:Organization", "name": "National Institute of Standards and Technology" }, "theme": [ "Advanced Communications:Wireless (RF)", "Mathematics and Statistics:Image and signal processing", "Information Technology:Privacy" ], "keyword": [ "Near-field metrology; side-channel security; BLE communication; wireless systems;" ] }