Advanced DPA Theory and Practice
Towards the Security Limits of Secure Embedded Circuits
Seiten
2015
Springer-Verlag New York Inc.
978-1-4939-0070-1 (ISBN)
Springer-Verlag New York Inc.
978-1-4939-0070-1 (ISBN)
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods.
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.
Eric Peeters, Ph.D is a Security Architect at Texas Instruments Inc.
General Introduction.- Side-Channel Cryptanalysis: a brief survey.- CMOS devices: sources and models of emanation.- Measurement of the power consumption.- Electromagnetic Leakage.- Statistical Tools.- Higher Order Attacks.- Towards the Evaluation of an Implementation against Side-Channel Attacks.- General Conclusion and Possible Further Directions.
Erscheint lt. Verlag | 20.5.2015 |
---|---|
Zusatzinfo | XVI, 139 p. |
Verlagsort | New York |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Technik ► Elektrotechnik / Energietechnik | |
ISBN-10 | 1-4939-0070-6 / 1493900706 |
ISBN-13 | 978-1-4939-0070-1 / 9781493900701 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99 €
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
69,99 €