Nothing Special   »   [go: up one dir, main page]

Meynard et al., 2011 - Google Patents

Characterization of the electromagnetic side channel in frequency domain

Meynard et al., 2011

View PDF
Document ID
1891156282105771099
Author
Meynard O
Réal D
Guilley S
Flament F
Danger J
Valette F
Publication year
Publication venue
Information Security and Cryptology: 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers 6

External Links

Snippet

In this article, we propose a new approach to characterize the EM leakage of electronic devices by identifying and focusing on the signals' frequencies leaking the most information. We introduce a set of tests based on cryptanalysis methods that will help vendors and users …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/06Receivers
    • H04B1/10Means associated with receiver for limiting or suppressing noise or interference induced by transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication

Similar Documents

Publication Publication Date Title
Meynard et al. Characterization of the electromagnetic side channel in frequency domain
Genkin et al. Get your hands off my laptop: physical side-channel key-extraction attacks on pcs: Extended version
Genkin et al. ECDSA key extraction from mobile devices via nonintrusive physical side channels
Agrawal et al. The EM side—channel (s)
Ulaş et al. Analysis and reconstruction of laser printer information leakages in the media of electromagnetic radiation, power, and signal lines
Skorobogatov et al. In the blink of an eye: There goes your AES key
Kim et al. Side channel analysis attacks using AM demodulation on commercial smart cards with SEED
Meynard et al. Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques
Goller et al. Side channel attacks on smartphones and embedded devices using standard radio equipment
Kinugawa et al. Electromagnetic information extortion from electronic devices using interceptor and its countermeasure
Song et al. Study of jamming countermeasure for electromagnetically leaked digital video signals
Iyer et al. An ANOVA method to rapidly assess information leakage near cryptographic modules
Feng et al. MLP and CNN-based classification of points of interest in side-channel attacks
Saab et al. Key extraction from the primary side of a switched-mode power supply
Kitazawa et al. Reconstruction of Sound Information Leakage Signals Obtained from Multiple Demodulation Methods
Hayashi et al. Information leakage from cryptographic hardware via common-mode current
Hatun et al. Side channel analysis using EM radiation of RSA algorithm implemented on raspberry Pi
Guillaume et al. Attacking at non-harmonic frequencies in screaming-channel attacks
Safta et al. Wavelet signal denoising applied on electromagnetic traces
Stoica et al. Signals sources recognition based on equipments electromagnetic emissions signature
Singh et al. Enabling power attack on traces of FPGA based block ciphers not acquired with start of encryption
Lavaud Reconfigurable systems for the interception of compromising sporadic signals
Popescu et al. Aspects regarding the customized analysis of emission security risks for certain types of compromising signals
Jun et al. Is your mobile device radiating keys
Baldini et al. Synchrosqueezing Transform Based Methodology for Radiometric Identification