
Security Issues in SoC Communication 333
ferential power analysis attacks, but they are not enough for higher-order
attacks.
8.2 Power Analysis Attacks
Power Analysis attacks are performed by measuring the power consumption of
adeviceasitoperates,andthenusingthese measurements to determine secret
information (such as secret keys and/or user PINs). These robust attacks are
often called “external monitoring attacks,” as they are noninvasive and use
observations of a device’s power consumption during its operation.
Simple Power Analysis (SPA) attacks recover the secret keys from direct
observation of individual power consumption measurements. They are