2014 First International Conference on Automation, Control, Energy and Systems (ACES) 2014
DOI: 10.1109/aces.2014.6807983
|View full text |Cite
|
Sign up to set email alerts
|

Side channel attacks and their mitigation techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Electromagnetic Analysis Attacks (EMA) : The electromagnetic analysis attack method utilizes information leaked in the form of electromagnetic radiation emitted from the target encryption device [ 23 ]. Electromagnetic analysis attacks are largely divided into simple electromagnetic analysis (SEMA) and differential electromagnetic analysis (DEMA).…”
Section: Motivation and Backgroundmentioning
confidence: 99%
“…Electromagnetic Analysis Attacks (EMA) : The electromagnetic analysis attack method utilizes information leaked in the form of electromagnetic radiation emitted from the target encryption device [ 23 ]. Electromagnetic analysis attacks are largely divided into simple electromagnetic analysis (SEMA) and differential electromagnetic analysis (DEMA).…”
Section: Motivation and Backgroundmentioning
confidence: 99%
“…The cybersecurity of commercial UAVs and IoT devices are at risk of this kind of fuzzing test without the proper security measures taken to defend them. [14] E. User Protection Unsecured UAV's and other IoT devices aren't the only possible victims of this fuzzing test. A device's security is only stable when a user follows proper protocol when maintaining its security.…”
Section: Gps Eliminationmentioning
confidence: 99%
“…According to S t a n d a e r t [70] side channel attacks are the category of attacks in which an attacker attempts to obtain confidential information by analyzing physically leaked timing information, power consumption or electromagnetic radiation. K h a n and M a h a n t a [71] have classified side channel attacks in four categories namely timing attack, electromagnetic attack, fault analysis attack, and power analysis attack. In Timing attack the adversary tries to get the information about the time taken by the device in different computations and then makes statistical analysis from this timing information to guess about the key.…”
Section: Side Channel Attacksmentioning
confidence: 99%
“…In fault analysis attacks these faulty outputs are analyzed to obtain secret information. K h a n and M a h a n t a [71] have mentioned that the only countermeasure to fault analysis attack is to restart the process again instead of continuing with the faulty output. Pop p, O s w a l d and M a n g a r d [74] have provided the introduction of power analysis attacks and their countermeasures.…”
Section: Side Channel Attacksmentioning
confidence: 99%