Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios
Side-channel analysis has been used to successfully attack many cryptographic systems. However, to improve trace quality and make collection of side-channel data easier, the attacker typically modifies the target device to add a trigger signal. This trigger implies a very powerful attacker with virt...
Saved in:
Published in | IEEE transactions on information forensics and security Vol. 8; no. 12; pp. 2101 - 2114 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York, NY
IEEE
01.12.2013
Institute of Electrical and Electronics Engineers |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!