We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
Video-Based Cryptanalysis: Recovering Cryptographic Keys from Device Using Video of Power LED
Attackers can recover cryptographic keys from devices by analyzing video footage of power LED, exploiting a vulnerability affecting IoT devices with type 2 power LED.
- Attackers can recover cryptographic keys from devices by analyzing video footage of power LED.
- The power LED of devices tends to flicker at specific frequencies, making it possible to determine the value of a bit.
- The Minerva attack targets IoT devices with type 2 power LED, which are commonly used in devices such as smart card readers and smart home devices.
- Researchers have demonstrated the ability to recover ECDSA and RSA keys from video footage of power LED.
- The attack requires a physical access to the device and can be performed using a smartphone or a low-cost camera.
- The Minerva attack can be launched remotely over the internet, and the authors have demonstrated the ability to recover secrets keys from servers.
- The attack is limited to systems that use type 2 power LED and may not work on devices that use other types of power LED.
- The attack can be mitigated by using a rolling shutter camera and a suitable error detection and correction mechanism.
- The Minerva attack can be used to recover secrets keys from devices that use elliptic curve cryptography.
- The attack is not limited to specific devices and can be used to recover secrets keys from a wide range of devices.
- The authors have demonstrated the ability to recover the complete ECDSA key from video footage of power LED.
- The attack can be used to recover secrets keys from devices that use RSA and ECDSA cryptography.
- The Minerva attack is a timing attack that relies on the correlation between the intensity of the power LED and the power consumption of the device.
- The attack can be used to recover secrets keys from devices that use cognitive radio and other types of PHY-layer attacks.
- The authors have demonstrated the ability to recover secrets keys from devices that use USB speakers and other types of devices.
- The Minerva attack can be used to recover secrets keys from devices that use other types of lateral movement attacks.
- The authors have demonstrated the ability to recover secrets keys from devices that use other types of wireless attacks.