Physical attacks, introduction and application to embedded processors
Article in conference proceedings
Physical attacks exploit the physical weaknesses of cryptographic devices to reveal the secret information stored on them. Successful attacks demonstrated in the past were both active, when the adversary tampers with the device to alter its normal behavior, or passive, when the adversary monitors side channels to infer the secret key. In view of this increasingly relevant problem, this talk introduces the most powerful physical attacks presented in the past and highlights state of the art countermeasures, focusing in particular on the embedded systems'' scenario.
10th International Conference on Design Technology of Integrated Systems in Nanoscale Era DTIS 2015
Start page number
cryptography, embedded processors, embedded systems, microprocessors chips, physical attacks