{"title":"通过实用的信息技术教育计划开发硬件安全方面的人力资源","authors":"N. Homma, Y. Hayashi, T. Katashita, H. Sone","doi":"10.1109/ISEMC.2014.6899071","DOIUrl":null,"url":null,"abstract":"This paper presents a framework for developing human resources in the field of hardware security based on a practical education program, called enPiT Security. The Hardware Security Exercise of enPiT Security aims to learn the fundamentals of information leakage from computer hardware, such as information communication devices, and to understand the importance of hardware security through practical exercises. Specifically, in this exercise, students learn about the principles of side-channel attacks and possible countermeasures against them. Such attacks can be threats to steal secret information from secondary (side-channel) information leaked during the operation of cryptographic hardware installed on IC cards, smartphones and other personal communication terminals.","PeriodicalId":279929,"journal":{"name":"2014 IEEE International Symposium on Electromagnetic Compatibility (EMC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Development of human resources in hardware security through practical information technology education program\",\"authors\":\"N. Homma, Y. Hayashi, T. Katashita, H. Sone\",\"doi\":\"10.1109/ISEMC.2014.6899071\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a framework for developing human resources in the field of hardware security based on a practical education program, called enPiT Security. The Hardware Security Exercise of enPiT Security aims to learn the fundamentals of information leakage from computer hardware, such as information communication devices, and to understand the importance of hardware security through practical exercises. Specifically, in this exercise, students learn about the principles of side-channel attacks and possible countermeasures against them. Such attacks can be threats to steal secret information from secondary (side-channel) information leaked during the operation of cryptographic hardware installed on IC cards, smartphones and other personal communication terminals.\",\"PeriodicalId\":279929,\"journal\":{\"name\":\"2014 IEEE International Symposium on Electromagnetic Compatibility (EMC)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Symposium on Electromagnetic Compatibility (EMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISEMC.2014.6899071\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Symposium on Electromagnetic Compatibility (EMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISEMC.2014.6899071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Development of human resources in hardware security through practical information technology education program
This paper presents a framework for developing human resources in the field of hardware security based on a practical education program, called enPiT Security. The Hardware Security Exercise of enPiT Security aims to learn the fundamentals of information leakage from computer hardware, such as information communication devices, and to understand the importance of hardware security through practical exercises. Specifically, in this exercise, students learn about the principles of side-channel attacks and possible countermeasures against them. Such attacks can be threats to steal secret information from secondary (side-channel) information leaked during the operation of cryptographic hardware installed on IC cards, smartphones and other personal communication terminals.