Logo image
Side channel attacks and device vulnerabilities: Methodologies of attack and prevention
Thesis   Open access

Side channel attacks and device vulnerabilities: Methodologies of attack and prevention

Ronda Rae Easley
University of West Florida,
Master of Science (MS), University of West Florida
2021

Metrics

108 File views/ downloads
256 Record Views

Abstract

Side channel attacks are methods by which the encrypted data on a device or network can be obtained through observation and manipulation of the unintended outputs of the device such as power or electromagnetic radiation fluctuations, timing variances, or even discrepancies in sound or acoustic levels while the device is processing cryptographic functions. These attacks have become more prevalent as internet-of-things (IoT) devices have become more commonplace. Often the priorities in the manufacture of such devices are compact size and low power consumption. Meeting these design parameters leads builders to insert less security measures into both the device hardware and the encryption software. Prior research details both the attack methods and countermeasure strategies that can be deployed during the design phase to offer higher security to the device. The research within this thesis defines and details the known methods of side channel attacks and identifies the intrinsic vulnerabilities of specific device types and encryption methods. This work further offers a tabular representation of the research which can be utilized by builders to identify vulnerabilities and recognize appropriate countermeasures.
pdf
Side Channel Attacks and Device Vulnerabilities714.34 kBDownloadView
Preprint Thesis pdf Open Access

Details

Logo image