However, these normally require expensive equipment, knowledgeable attackers and time. Invasive atta cks, such as reverse engineering followed by microprobing or FIB editing, give almost unlimited capabilities to extract information from chips. Nevertheless, security holes in designs an d careless dealing with confidential information can lead to such attacks. The large complexity of modern chip s leaves less room for non-invasive attacks. However, insider information about device functionality can be helpful. Non-invasive techniques, such as timing, power or e lectromagnetic analysis, glitch attacks or exploits of data remanence, require only moderately sophisticated equipment and knowledge to implement. Three classes of physical attacks can be distinguis hed by the way the device is accessed. I will survey the area of hardware security and dis cuss the progress in attack technologies and protections. Hardw are engineers should be well familiar with attack technologies in order to design a syste m with appropriate level of security protection at a minimal cost. confidentiality and integrity of the information stored inside the security chips. These applications demand a high level of security protection from various attacks against. In the last five years, dedicated crypto chips have been embedded in devices from game console accessories to printer ink cartridges and mobile phone batteries. Major applications, such as mobile phone identifica tion and pay-TV receivers, have pushed low-cost crypto-processors toward everyday use.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |