Common framework to evaluate modern embedded systems against side-channel attacks

Youssef Souissi, S. Guilley, S. Bhasin, J. Danger
{"title":"Common framework to evaluate modern embedded systems against side-channel attacks","authors":"Youssef Souissi, S. Guilley, S. Bhasin, J. Danger","doi":"10.1109/THS.2011.6107852","DOIUrl":null,"url":null,"abstract":"Modern embedded systems rely on cryptographic co-processors to ensure security. These cryptographic coprocessors are theoretically secure but their physical implementations are vulnerable against Side-Channel Attacks (SCA). This paper puts forward a methodology to evaluate the robustness of embedded systems against such attacks and therefore enhance user trust. We propose an evaluation framework composed of five distinct phases which are characterization, simulation, acquisition, pre-processing and analysis. The paper will also highlight common pitfalls made by evaluators and their solutions.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"735 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2011.6107852","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Modern embedded systems rely on cryptographic co-processors to ensure security. These cryptographic coprocessors are theoretically secure but their physical implementations are vulnerable against Side-Channel Attacks (SCA). This paper puts forward a methodology to evaluate the robustness of embedded systems against such attacks and therefore enhance user trust. We propose an evaluation framework composed of five distinct phases which are characterization, simulation, acquisition, pre-processing and analysis. The paper will also highlight common pitfalls made by evaluators and their solutions.
评估现代嵌入式系统对抗侧信道攻击的通用框架
现代嵌入式系统依靠加密协处理器来确保安全性。这些加密协处理器在理论上是安全的,但它们的物理实现容易受到侧信道攻击(SCA)的攻击。本文提出了一种方法来评估嵌入式系统对此类攻击的鲁棒性,从而提高用户信任。我们提出了一个由表征、仿真、采集、预处理和分析五个不同阶段组成的评估框架。本文还将重点介绍评价者常犯的陷阱及其解决方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信