{"title":"Common framework to evaluate modern embedded systems against side-channel attacks","authors":"Youssef Souissi, S. Guilley, S. Bhasin, J. Danger","doi":"10.1109/THS.2011.6107852","DOIUrl":null,"url":null,"abstract":"Modern embedded systems rely on cryptographic co-processors to ensure security. These cryptographic coprocessors are theoretically secure but their physical implementations are vulnerable against Side-Channel Attacks (SCA). This paper puts forward a methodology to evaluate the robustness of embedded systems against such attacks and therefore enhance user trust. We propose an evaluation framework composed of five distinct phases which are characterization, simulation, acquisition, pre-processing and analysis. The paper will also highlight common pitfalls made by evaluators and their solutions.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"735 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2011.6107852","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Modern embedded systems rely on cryptographic co-processors to ensure security. These cryptographic coprocessors are theoretically secure but their physical implementations are vulnerable against Side-Channel Attacks (SCA). This paper puts forward a methodology to evaluate the robustness of embedded systems against such attacks and therefore enhance user trust. We propose an evaluation framework composed of five distinct phases which are characterization, simulation, acquisition, pre-processing and analysis. The paper will also highlight common pitfalls made by evaluators and their solutions.