Search for contacts, projects,
courses and publications

Physical attacks, introduction and application to embedded processors

Additional information

Authors
Type
Article in conference proceedings
Year
2015
Language
English
Abstract
Physical attacks exploit the physical weaknesses of cryptographic devices to reveal the secret information stored on them. Successful attacks demonstrated in the past were both active, when the adversary tampers with the device to alter its normal behavior, or passive, when the adversary monitors side channels to infer the secret key. In view of this increasingly relevant problem, this talk introduces the most powerful physical attacks presented in the past and highlights state of the art countermeasures, focusing in particular on the embedded systems'' scenario.
Conference proceedings
10th International Conference on Design Technology of Integrated Systems in Nanoscale Era DTIS 2015
Month
June
Publisher
IEEE
Start page number
1
Meeting place
Napoli, Italy
ISBN
978-1-4799-1999-4
Keywords
cryptography, embedded processors, embedded systems, microprocessors chips, physical attacks