Video-Based Cryptanalysis: Recovering Cryptographic Keys from Device Using Video of Power LED

Attackers can recover cryptographic keys from devices by analyzing video footage of power LED, exploiting a vulnerability affecting IoT devices with type 2 power LED.

Key takeaways
  • Attackers can recover cryptographic keys from devices by analyzing video footage of power LED.
  • The power LED of devices tends to flicker at specific frequencies, making it possible to determine the value of a bit.
  • The Minerva attack targets IoT devices with type 2 power LED, which are commonly used in devices such as smart card readers and smart home devices.
  • Researchers have demonstrated the ability to recover ECDSA and RSA keys from video footage of power LED.
  • The attack requires a physical access to the device and can be performed using a smartphone or a low-cost camera.
  • The Minerva attack can be launched remotely over the internet, and the authors have demonstrated the ability to recover secrets keys from servers.
  • The attack is limited to systems that use type 2 power LED and may not work on devices that use other types of power LED.
  • The attack can be mitigated by using a rolling shutter camera and a suitable error detection and correction mechanism.
  • The Minerva attack can be used to recover secrets keys from devices that use elliptic curve cryptography.
  • The attack is not limited to specific devices and can be used to recover secrets keys from a wide range of devices.
  • The authors have demonstrated the ability to recover the complete ECDSA key from video footage of power LED.
  • The attack can be used to recover secrets keys from devices that use RSA and ECDSA cryptography.
  • The Minerva attack is a timing attack that relies on the correlation between the intensity of the power LED and the power consumption of the device.
  • The attack can be used to recover secrets keys from devices that use cognitive radio and other types of PHY-layer attacks.
  • The authors have demonstrated the ability to recover secrets keys from devices that use USB speakers and other types of devices.
  • The Minerva attack can be used to recover secrets keys from devices that use other types of lateral movement attacks.
  • The authors have demonstrated the ability to recover secrets keys from devices that use other types of wireless attacks.