Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios

Side-channel analysis has been used to successfully attack many cryptographic systems. However, to improve trace quality and make collection of side-channel data easier, the attacker typically modifies the target device to add a trigger signal. This trigger implies a very powerful attacker with virt...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 8; no. 12; pp. 2101 - 2114
Main Authors Montminy, David P., Baldwin, Rusty O., Temple, Michael A., Oxley, Mark E.
Format Journal Article
LanguageEnglish
Published New York, NY IEEE 01.12.2013
Institute of Electrical and Electronics Engineers
Subjects
Online AccessGet full text

Cover

Loading…