Главная
Study mode:
on
1
Intro
2
Agenda
3
Why are we interested
4
The biggest problem
5
The hypothesis
6
Who cares
7
Maturity
8
Keysight
9
Endpoint devices
10
Embedded devices
11
Industry interconnect standards
12
Sidechannel attacks
13
History of sidechannel
14
Oscilloscope
15
Techniques
16
Interface analysis
17
The black box
18
Data analysis
19
Dr Owen Lo
20
Simple Power Analysis SP
21
Differential Power Analysis SP
22
Correlation Power Analysis
23
Aes128 attack
24
How it works
25
Reallife example
26
Power models
Description:
Explore practical side-channel attacks on embedded device cryptography in this 52-minute talk by Dr Owen Lo and Doug Carson from The Cyber Academy. Delve into the history, techniques, and real-life examples of side-channel attacks, including Simple Power Analysis, Differential Power Analysis, and Correlation Power Analysis. Learn about the biggest problems in embedded device security, industry interconnect standards, and the use of oscilloscopes for interface analysis. Examine the AES-128 attack methodology and power models, gaining insights into the vulnerabilities of embedded systems and the importance of robust cryptographic implementations.

Practical Side-Channel Attacks on Embedded Device Cryptography - Dr Owen Lo and Doug Carson

The Cyber Academy
Add to list