Side-Channel Attacks
Pankaj Rohatgi, IBM T. J. Watson Research Center
Extensions, Countermeasures, and Further Reading
Information Within Power Consumption Signals
EM Attacks on an RSA Accelerator
Advanced Side-Channel Analysis Techniques
Reverse Engineering Using Side Channels: First Steps
Combining Side Channels with Invasive or Fault Attacks
Combining Classical and Side-Channel Cryptanalysis
Connections Between Side-Channel and Covert-Channel Analysis
INTRODUCTION
Maintaining information integrity and confidentiality is a core security requirement in most systems. These goals are typically realized using a combination of techniques such as authentication, discretionary and mandatory access control, use of high-assurance trusted components, encryption, integrity tags, and secure communication protocols.
In most commercial environments, however, these generic techniques are applied and analyzed only with respect to an abstract model of the system being protected. Thus, gaps between the model and actual implementation can open up a system to attacks that its designers never anticipated. Poorly designed and implemented ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.