Sixteenth International Symposium on Quality Electronic Design 2015
DOI: 10.1109/isqed.2015.7085468
|View full text |Cite
|
Sign up to set email alerts
|

Side channel attacks in embedded systems: A tale of hostilities and deterrence

Abstract: Security of embedded computing systems is becoming paramount as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Side Channel Attacks, in particular, have been effective in obtaining secret keys which protect information. In this paper we selectively classify the side channel attacks, and selectively demonstrate a few attacks. We further classify the popular countermeasures to Side Channel Attacks. The paper paints an overall picture for a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 62 publications
(80 reference statements)
0
15
0
Order By: Relevance
“…(2) Security risk can be assessed based on attack methods. According to [67], methods of attacks can be classified into three different typical methods: (1) physical method, (2) logical or software-based method, and (3) Side-Channel attack method.…”
Section: A Security Risk Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…(2) Security risk can be assessed based on attack methods. According to [67], methods of attacks can be classified into three different typical methods: (1) physical method, (2) logical or software-based method, and (3) Side-Channel attack method.…”
Section: A Security Risk Metricsmentioning
confidence: 99%
“…-A physical attack, whether non-invasive, semiinvasive, or invasive attack means an attacker's ability to access the cyber-physical system directly and this direct physical access is unauthorized and unauthenticated [67]. In this case, it is unpredictable to know what the attacker can do.…”
Section: A Security Risk Metricsmentioning
confidence: 99%
“…Moreover, as mobile edge computing becomes more and more ubiquitous, security issues in these mobile devices become more paramount. Such mobile devices have to face hostile security threats [4]- [7] such as physical, logical/software-based and side-channel/lateral attacks. Amongst these, side-channel attack [4]- [6] is a popular security threat due to ease of access to the physical hardware where attacks are performed by observing the properties and behavior of the system such as power consumption, thermal dissipation, electromagnetic emission, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Comparatively a lot less documented studies are performed in temperature (thermal) based side channel attacks [4]- [6] in mobile edge devices. Most of these mobile devices come equipped with heterogeneous multi-processors systemson-chip (MPSoC), which consists of multiple heterogeneous processors on a single chip, capable of processing different types of applications to cater for performance and energyefficiency of the executing applications.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, the cryptographic schemes in embedded systems are deployed in unforeseen adversarial settings where keys can be compromised through side-channel attacks. Such attacks have been reported on embedded devices [1] where the attacker extracts secret information from a victim program by observing a physical phenomenon, e.g. execution time and power consumption, during its execution [2].…”
Section: Introductionmentioning
confidence: 99%