Cargando…
Advanced DPA theory and practice: towards the security limits of secure embedded circuits
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different as...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Springer
2013
|
Materias: | |
Acceso en línea: | https://dx.doi.org/10.1007/978-1-4614-6783-0 http://cds.cern.ch/record/1537721 |
_version_ | 1780929688975179776 |
---|---|
author | Peeters, Eric |
author_facet | Peeters, Eric |
author_sort | Peeters, Eric |
collection | CERN |
description | Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate. |
id | cern-1537721 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2013 |
publisher | Springer |
record_format | invenio |
spelling | cern-15377212021-04-21T22:49:53Zdoi:10.1007/978-1-4614-6783-0http://cds.cern.ch/record/1537721engPeeters, EricAdvanced DPA theory and practice: towards the security limits of secure embedded circuitsEngineeringAdvanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.Springeroai:cds.cern.ch:15377212013 |
spellingShingle | Engineering Peeters, Eric Advanced DPA theory and practice: towards the security limits of secure embedded circuits |
title | Advanced DPA theory and practice: towards the security limits of secure embedded circuits |
title_full | Advanced DPA theory and practice: towards the security limits of secure embedded circuits |
title_fullStr | Advanced DPA theory and practice: towards the security limits of secure embedded circuits |
title_full_unstemmed | Advanced DPA theory and practice: towards the security limits of secure embedded circuits |
title_short | Advanced DPA theory and practice: towards the security limits of secure embedded circuits |
title_sort | advanced dpa theory and practice: towards the security limits of secure embedded circuits |
topic | Engineering |
url | https://dx.doi.org/10.1007/978-1-4614-6783-0 http://cds.cern.ch/record/1537721 |
work_keys_str_mv | AT peeterseric advanceddpatheoryandpracticetowardsthesecuritylimitsofsecureembeddedcircuits |