Affiliation:
1. School of Information Technology, Deakin University, Geelong 3216, Australia
Abstract
Side channels are unintended pathways within target systems that leak internal target information. Side-channel sensing (SCS) is the process of exploiting side channels to extract embedded target information. SCS is well established within the cybersecurity (CYB) domain, and has recently been proposed for medical diagnostics and monitoring (MDM). Remaining unrecognised is its applicability to human–computer interaction (HCI), among other domains (Misc). This article analyses literature demonstrating SCS examples across the MDM, HCI, Misc, and CYB domains. Despite their diversity, established fields of advanced sensing and signal processing underlie each example, enabling the unification of these currently otherwise isolated domains. Identified themes are collating under a proposed domain-agnostic SCS framework. This SCS framework enables a formalised and systematic approach to studying, detecting, and exploiting of side channels both within and between domains. Opportunities exist for modelling SCS as data structures, allowing for computation irrespective of domain. Future methodologies can take such data structures to enable cross- and intra-domain transferability of extraction techniques, perform side-channel leakage detection, and discover new side channels within target systems.
Reference102 articles.
1. Side-Channel Sensing: Exploiting Side-Channels to Extract Information for Medical Diagnostics and Monitoring;Spence;IEEE J. Transl. Eng. Health Med.,2020
2. Security beyond cybersecurity: Side-channel attacks against non-cyber systems and their countermeasures;Spence;Int. J. Inf. Secur.,2021
3. Standaert, F.X., Malkin, T.G., and Yung, M. (2009). A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, 26–30 April 2009, Springer. Proceedings 28.
4. Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices;Spreitzer;IEEE Commun. Surv. Tutorials,2018
5. Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses;Giechaskiel;IEEE Commun. Surv. Tutorials,2020