
Analogue
Substrate
Legitimate signal + Noise
Substrate Coupling
DAC Amp
Digital Noise Fclock FRadio Fclock
Fclock
Digital
Fig. 1. Screaming channel attacks: Conventional side-channels leak to the
RF module in the analog part, present on the same die. This one transmits
side-channels at a larger distance (until some meters).
dard (AES) on an embedded device.
•a discussion on the method limitations and solutions.
•experimental results demonstrating the gains obtained
with these solutions.
VT does not require any specific setup on the victim side,
like a trigger signal to indicate the start of a CP. It consists in
finding a precise enough time duration of the targeted process
executed periodically. This makes it possible to act as if a
trigger would indicate a common location in all the process
segments. This virtual trigger can then be used to segment
CPs from a trace. The method aims at helping researchers to
reduce the effort in target preparation and in the collecting
phase of the attack, while also giving a small step toward a
more realistic attack scenario.
The paper is organized as follows. Section II provides the
context of this work and Section III discusses related works.
Then, Section V details the proposed virtual trigger segmenta-
tion method, and Section VI evaluates it experimentally on a
screaming channel setup. Section VII discusses the limitation
of the method and proposes a solution to overcome it. Finally,
Section VIII concludes the paper.
II. SCREAMING CHANNEL ATTACKS
Experimental results build on the attack scenario called
screaming channels introduced by Camurati, et al. [1]. As
illustrated in Fig. 1, screaming channels occur on mixed-signal
devices where digital processing is collocated with analog
Radio Frequency (RF) electronics over a single die. Side-
channels originated from digital processing mix with RF signal
and get amplified, modulated, and broadcast. The primary
threat posed by screaming channels is the risk of transmitting
secrets over long distances, i.e., scream them.
The screaming channel signals are very noisy. Plus, to
collect them, it is necessary that the RF module transmits a
legitimate signal. In the context of this paper, it is a Bluetooth
signal. Between two Bluetooth transmissions, the collected
signal contains holes. As in regular screaming channel analy-
sis, to counterbalance these constraints, time diversity is used
during the collection phase. The principle is to force the device
to compute multiple encryptions with the same plaintext and
key. Since the same data has been computed, their segment
values should be the same, except for the noise. Averaging
the segments returns a CP segment with reduced noise.
III. RELATED WORKS ON SEGMENT SYNCHRONIZATION
Synchronization is used to know to which CP operations
each segment point belongs to. Otherwise, segment points
corresponding to operations whose leakage values are data-
correlated would be compared with other unrelated points.
Therefore, it would be harder to distinguish a relationship be-
tween leakage values and data. We name these data-correlated
points as Points of Interest (POIs). To synchronize segments,
an alignment between them can be done using techniques like
static alignment [9], longest common sequence [10], elastic
alignment [11] and synchronous real-time sampling [12].
Before aligning segments, it is first necessary to locate these
segments of interest in the traces. The most common technique
in SCA research consists of inserting a trigger signal to start
the trace measurement synchronized with the beginning of
the CP. Attack setups are prepared to either have (1) the
victim to create the trigger signal to inform the attacker when
encryption starts, or (2) the attacker sending a trigger signal
to the victim to make it start at a precise moment. This is an
accepted scenario in the community to enable SCA research.
But it assumes attackers have access to the victim to generate
or listen to a trigger synchronization signal. SAKURA and
NewAE’s Chipwhisperer are widely used platforms in the
community that follow this approach.
However, in many cases, using a trigger signal is impossible.
For example, when a given firmware cannot be modified to
add instructions that control the trigger signal. Or simply
because the device used to collect traces is not capable of
capturing two signals, the side-channel signal and the trigger
signal, concurrently. Locating CPs in traces without using
trigger signals can be done with pattern recognition techniques.
For this purpose, Beckers, et al. [13] compare methods that
calculate the correspondence between trace and pattern values.
When this match score is over a pre-defined threshold, the
corresponding part of the leakage is considered as being
the location in the trace of a targeted segment. IcWaves1
implements such pattern recognition methods.
Nevertheless, to use these methods, the attacker is supposed
to already have a pattern or characterized segments having
the same statistical properties as the researched segments,
representative of the triggering moment. Therefore, the ques-
tion of how to find this pattern remains open. To that end,
Trautmann et al. [14] proposed a technique to locate AES
CPs in leakage signals by searching for parts of the leakage
having consecutive similar patterns corresponding to the 10
AES rounds. This method can find AES CPs in long traces
also containing other CP operation leakages. Souissi et al. [15]
used wavelet transforms to detect the limit of AES segments in
traces and then used these segments to do pattern recognition.
In the screaming channels context, in order to locate CPs
from leakage signals, the only technique reported so far in
the literature, by Camurati et al. [1] and Wang et al. [16],
used a frequency component trigger mechanism2. The method
1https://www.riscure.com/security-tools/hardware/icwaves.
2https://github.com/bolek42/rsa-sdr.