Meynard et al., 2011 - Google Patents
Characterization of the electromagnetic side channel in frequency domainMeynard et al., 2011
View PDF- Document ID
- 1891156282105771099
- Author
- Meynard O
- Réal D
- Guilley S
- Flament F
- Danger J
- Valette F
- Publication year
- Publication venue
- Information Security and Cryptology: 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers 6
External Links
Snippet
In this article, we propose a new approach to characterize the EM leakage of electronic devices by identifying and focusing on the signals' frequencies leaking the most information. We introduce a set of tests based on cryptanalysis methods that will help vendors and users …
- 238000010192 crystallographic characterization 0 title abstract description 14
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/06—Receivers
- H04B1/10—Means associated with receiver for limiting or suppressing noise or interference induced by transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Meynard et al. | Characterization of the electromagnetic side channel in frequency domain | |
Genkin et al. | Get your hands off my laptop: physical side-channel key-extraction attacks on pcs: Extended version | |
Genkin et al. | ECDSA key extraction from mobile devices via nonintrusive physical side channels | |
Agrawal et al. | The EM side—channel (s) | |
Ulaş et al. | Analysis and reconstruction of laser printer information leakages in the media of electromagnetic radiation, power, and signal lines | |
Skorobogatov et al. | In the blink of an eye: There goes your AES key | |
Kim et al. | Side channel analysis attacks using AM demodulation on commercial smart cards with SEED | |
Meynard et al. | Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques | |
Goller et al. | Side channel attacks on smartphones and embedded devices using standard radio equipment | |
Kinugawa et al. | Electromagnetic information extortion from electronic devices using interceptor and its countermeasure | |
Song et al. | Study of jamming countermeasure for electromagnetically leaked digital video signals | |
Iyer et al. | An ANOVA method to rapidly assess information leakage near cryptographic modules | |
Feng et al. | MLP and CNN-based classification of points of interest in side-channel attacks | |
Saab et al. | Key extraction from the primary side of a switched-mode power supply | |
Kitazawa et al. | Reconstruction of Sound Information Leakage Signals Obtained from Multiple Demodulation Methods | |
Hayashi et al. | Information leakage from cryptographic hardware via common-mode current | |
Hatun et al. | Side channel analysis using EM radiation of RSA algorithm implemented on raspberry Pi | |
Guillaume et al. | Attacking at non-harmonic frequencies in screaming-channel attacks | |
Safta et al. | Wavelet signal denoising applied on electromagnetic traces | |
Stoica et al. | Signals sources recognition based on equipments electromagnetic emissions signature | |
Singh et al. | Enabling power attack on traces of FPGA based block ciphers not acquired with start of encryption | |
Lavaud | Reconfigurable systems for the interception of compromising sporadic signals | |
Popescu et al. | Aspects regarding the customized analysis of emission security risks for certain types of compromising signals | |
Jun et al. | Is your mobile device radiating keys | |
Baldini et al. | Synchrosqueezing Transform Based Methodology for Radiometric Identification |