{"title":"Development of human resources in hardware security through practical information technology education program","authors":"N. Homma, Y. Hayashi, T. Katashita, H. Sone","doi":"10.1109/ISEMC.2014.6899071","DOIUrl":null,"url":null,"abstract":"This paper presents a framework for developing human resources in the field of hardware security based on a practical education program, called enPiT Security. The Hardware Security Exercise of enPiT Security aims to learn the fundamentals of information leakage from computer hardware, such as information communication devices, and to understand the importance of hardware security through practical exercises. Specifically, in this exercise, students learn about the principles of side-channel attacks and possible countermeasures against them. Such attacks can be threats to steal secret information from secondary (side-channel) information leaked during the operation of cryptographic hardware installed on IC cards, smartphones and other personal communication terminals.","PeriodicalId":279929,"journal":{"name":"2014 IEEE International Symposium on Electromagnetic Compatibility (EMC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Symposium on Electromagnetic Compatibility (EMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEMC.2014.6899071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper presents a framework for developing human resources in the field of hardware security based on a practical education program, called enPiT Security. The Hardware Security Exercise of enPiT Security aims to learn the fundamentals of information leakage from computer hardware, such as information communication devices, and to understand the importance of hardware security through practical exercises. Specifically, in this exercise, students learn about the principles of side-channel attacks and possible countermeasures against them. Such attacks can be threats to steal secret information from secondary (side-channel) information leaked during the operation of cryptographic hardware installed on IC cards, smartphones and other personal communication terminals.