We present a Side-Channel Analysis Platform (SCAP) Framework developed to acquire and study the traces derived from a cryptographic device when cryptographic computations are done. The main goal of this work is to develop a tool for performing side-channel attacks against these cryptographic devices. The characteristics of the SCAP Framework are described and a case study with a smartphone is presented.
Acknowledgments
This work has been partly supported by Ministerio de Economía y Competitividad (Spain) under the projects TIN2014-55325-C2-1-R (ProCriCiS), TIN2013-46469-R (SPINY), TIN2016-79095-C2-2-R (SMOG-DEV), and by Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE), cofinanced with the European Union FEDER funds. We thank National Instruments for its support.