Project: EM Side-Channel Analysis for Digital Forensics

Unintentional electromagnetic (EM) emissions from computing devices are a well known source of side-channel information leakage. There’s a significant number of published work related to EM side-channel attacks focusing on various aspects. Verifying firmware running on devices, monitoring program activities for potential malfunctions, eavesdropping on computers, attacking cryptographic operations to recover keys are some of the examples.

tempest-hackaday-image
Image Source: https://hackaday.com/2015/10/19/tempest-a-tin-foil-hat-for-your-electronics-and-their-secrets/

Digital forensics is a field where digital evidences are collected from computing devices in order to support legal investigations. With the emergence of Internet of Things (IoT), more and more small, low-cost computing devices are being ended-up in crime scenes which can contain potential case-advancing digital evidences. In this project work, we are exploring how we can utilize EM emissions from Internet of Things (IoT) for the purpose of assisting digital forensics investigations. The advantage of the EM side-channel analysis in digital forensics context is the non-invasive nature of the the attack. It is important for digital forensic evidence collection activities to make sure that the devices being investigated does not get altered in any way.