A device's real time power consumption may be monitored during security token evaluation and the information gleaned may be used to determine the value of the reference token.
The power consumed by a device may be instrumented and monitored in real time. If the algorithm for evaluating security tokens is not sufficiently robust, the power consumption may vary by token entry comparison against the reference value. Further, if retries are unlimited, the power difference between a "good" entry and a "bad" entry may be observed and used to determine whether each entry itself is correct thereby allowing unauthorized parties to calculate the reference value.
Impact: Modify MemoryRead MemoryRead Files or DirectoriesModify Files or DirectoriesExecute Unauthorized Code or CommandsGain Privileges or Assume IdentityBypass Protection MechanismRead Application DataModify Application DataHide Activities
As compromising a security token may result in complete system control, the impacts are relatively universal.
static nonvolatile password_tries = NUM_RETRIES; do
cstatic nonvolatile password_tries = NUM_RETRIES; do
cmodule siso(clk,rst,a,q);
verilogmodule pipo(clk,rst,a,q);
verilog