DocumentCode
713591
Title
Physical attacks, introduction and application to embedded processors
Author
Regazzoni, Francesco
Author_Institution
ALaRI, Univ. della Svizzera italiana, Switzerland
fYear
2015
fDate
21-23 April 2015
Firstpage
1
Lastpage
1
Abstract
Summary form only given. Physical attacks exploit the physical weaknesses of cryptographic devices to reveal the secret information stored on them. Successful attacks demonstrated in the past were both active, when the adversary tampers with the device to alter its normal behavior, or passive, when the adversary monitors side channels to infer the secret key. In view of this increasingly relevant problem, this talk introduces the most powerful physical attacks presented in the past and highlights state of the art countermeasures, focusing in particular on the embedded systems´ scenario.
Keywords
cryptography; microprocessor chips; cryptographic devices; embedded processors; embedded systems; physical attacks; Cryptography; Diffusion tensor imaging; Embedded systems; Focusing; Monitoring; Nanoscale devices; Program processors;
fLanguage
English
Publisher
ieee
Conference_Titel
Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2015 10th International Conference on
Conference_Location
Naples
Type
conf
DOI
10.1109/DTIS.2015.7127356
Filename
7127356
Link To Document