Cargando…

Advanced DPA theory and practice: towards the security limits of secure embedded circuits

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different as...

Descripción completa

Detalles Bibliográficos
Autor principal: Peeters, Eric
Lenguaje:eng
Publicado: Springer 2013
Materias:
Acceso en línea:https://dx.doi.org/10.1007/978-1-4614-6783-0
http://cds.cern.ch/record/1537721
_version_ 1780929688975179776
author Peeters, Eric
author_facet Peeters, Eric
author_sort Peeters, Eric
collection CERN
description Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.
id cern-1537721
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2013
publisher Springer
record_format invenio
spelling cern-15377212021-04-21T22:49:53Zdoi:10.1007/978-1-4614-6783-0http://cds.cern.ch/record/1537721engPeeters, EricAdvanced DPA theory and practice: towards the security limits of secure embedded circuitsEngineeringAdvanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.Springeroai:cds.cern.ch:15377212013
spellingShingle Engineering
Peeters, Eric
Advanced DPA theory and practice: towards the security limits of secure embedded circuits
title Advanced DPA theory and practice: towards the security limits of secure embedded circuits
title_full Advanced DPA theory and practice: towards the security limits of secure embedded circuits
title_fullStr Advanced DPA theory and practice: towards the security limits of secure embedded circuits
title_full_unstemmed Advanced DPA theory and practice: towards the security limits of secure embedded circuits
title_short Advanced DPA theory and practice: towards the security limits of secure embedded circuits
title_sort advanced dpa theory and practice: towards the security limits of secure embedded circuits
topic Engineering
url https://dx.doi.org/10.1007/978-1-4614-6783-0
http://cds.cern.ch/record/1537721
work_keys_str_mv AT peeterseric advanceddpatheoryandpracticetowardsthesecuritylimitsofsecureembeddedcircuits