Главная
Study mode:
on
1
Intro
2
Cryptographic Algorithms
3
Power vs EM Side-Channels
4
Localized EMA
5
Electromagnetic SCA Attacks
6
Differential EM Analysis
7
Trace Collection: Localized EM
8
Trace Collection: Probe Placement
9
Trace Collection: Pre-Processing
10
Aligning Traces
11
Static Alignment
12
Side-Channel Countermeasures
13
EMA Countermeasures
14
Localized EM: Spatial Randomization
15
Moving Target Defense
16
Ongoing Work
Description:
Explore electromagnetic side-channel attacks and potential countermeasures in this 28-minute lecture by Tristen Mullins from the University of South Alabama. Delve into cryptographic algorithms, power versus electromagnetic side-channels, and localized electromagnetic analysis. Learn about differential EM analysis, trace collection techniques, and the importance of probe placement and pre-processing. Discover methods for aligning traces, including static alignment, and examine various side-channel countermeasures. Gain insights into EMA countermeasures, spatial randomization for localized EM, and moving target defense strategies. Conclude with an overview of ongoing work in this critical area of cybersecurity.

Electromagnetic Side-Channel Attacks and Potential Countermeasures

CAE in Cybersecurity Community
Add to list
0:00 / 0:00