Youssef Souissi, J. Danger, S. Mekki, S. Guilley, Maxime Nassar
{"title":"Techniques for electromagnetic attacks enhancement","authors":"Youssef Souissi, J. Danger, S. Mekki, S. Guilley, Maxime Nassar","doi":"10.1109/DTIS.2010.5487590","DOIUrl":null,"url":null,"abstract":"Electromagnetic attacks (EMA) pose real threats to embedded devices containing a secret information. Such attacks are of great concern since they are completely passive, low cost and easily mounted in practice. In this paper, we propose two innovative techniques to enhance electromagnetic attacks by reducing the number of measurements needed to succeed an attack on cryptographic implementations. The first method is based on the electromagnetic shielding theory which aims at decreasing the contribution of external noise sources. Whereas, the second provides an algorithmic solution to preprocess electromagnetic signals using the Kalman filtering (KF).","PeriodicalId":423978,"journal":{"name":"5th International Conference on Design & Technology of Integrated Systems in Nanoscale Era","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th International Conference on Design & Technology of Integrated Systems in Nanoscale Era","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DTIS.2010.5487590","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Electromagnetic attacks (EMA) pose real threats to embedded devices containing a secret information. Such attacks are of great concern since they are completely passive, low cost and easily mounted in practice. In this paper, we propose two innovative techniques to enhance electromagnetic attacks by reducing the number of measurements needed to succeed an attack on cryptographic implementations. The first method is based on the electromagnetic shielding theory which aims at decreasing the contribution of external noise sources. Whereas, the second provides an algorithmic solution to preprocess electromagnetic signals using the Kalman filtering (KF).