<p><i>Security Science</i> integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners and students the underlying scientific perspe
Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits
โ Scribed by Eric Peeters (auth.)
- Publisher
- Springer-Verlag New York
- Year
- 2013
- Tongue
- English
- Leaves
- 145
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.
โฆ Table of Contents
Front Matter....Pages i-xvi
General Introduction....Pages 1-7
Front Matter....Pages 9-9
Side-Channel Cryptanalysis: A Brief Survey....Pages 11-19
Front Matter....Pages 21-21
CMOS Devices: Sources and Models of Emanation....Pages 23-40
Measurement of the Power Consumption....Pages 41-54
Electromagnetic Leakage....Pages 55-69
Front Matter....Pages 71-71
Statistical Tools....Pages 73-96
Higher Order Attacks....Pages 97-108
Front Matter....Pages 109-109
Toward the Evaluation of an Implementation Against Side-Channel Attacks....Pages 111-128
General Conclusion and Possible Further Directions....Pages 129-132
Back Matter....Pages 133-139
โฆ Subjects
Electronics and Microelectronics, Instrumentation; Systems and Data Security; Circuits and Systems; Data Structures, Cryptology and Information Theory
๐ SIMILAR VOLUMES
Front Cover; Security Science: The Theory and Practice of Security; Copyright; Dedication; Contents; Acknowledgments; About the Authors; Foreword; Preface; Chapter 1: Concept of Security; Introduction; Scientific method in support of security science; Scientific Method; Engineering Design Process; D
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented