Side channel attacks and device vulnerabilities: Methodologies of attack and prevention
Ronda Rae Easley
University of West Florida,
Master of Science (MS), University of West Florida
2021
Metrics
108 File views/ downloads
256 Record Views
Abstract
Side channel attacks are methods by which the encrypted data on a device or network can be obtained through observation and manipulation of the unintended outputs of the device such as power or electromagnetic radiation fluctuations, timing variances, or even discrepancies in sound or acoustic levels while the device is processing cryptographic functions. These attacks have become more prevalent as internet-of-things (IoT) devices have become more commonplace. Often the priorities in the manufacture of such devices are compact size and low power consumption. Meeting these design parameters leads builders to insert less security measures into both the device hardware and the encryption software. Prior research details both the attack methods and countermeasure strategies that can be deployed during the design phase to offer higher security to the device. The research within this thesis defines and details the known methods of side channel attacks and identifies the intrinsic vulnerabilities of specific device types and encryption methods. This work further offers a tabular representation of the research which can be utilized by builders to identify vulnerabilities and recognize appropriate countermeasures.
Files and links (1)
pdf
Side Channel Attacks and Device Vulnerabilities714.34 kBDownloadView
Preprint Thesis pdf Open Access
Details
Title
Side channel attacks and device vulnerabilities
Resource Type
Thesis
Publisher
University of West Florida,; [Pensacola, Florida] :