Side channel attacks in embedded systems: A tale of hostilities and deterrence
2015
Security of embedded computing systems is becoming paramount as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Side Channel Attacks, in particular, have been effective in obtaining secret keys which protect information. In this paper we selectively classify the side channel attacks, and selectively demonstrate a few attacks. We further classify the popular countermeasures to Side Channel Attacks. The paper paints an overall picture for a researcher or a practitioner who seeks to understand or begin to work in the area of side channel attacks in embedded systems.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
85
References
11
Citations
NaN
KQI