This research is the first of its kind to investigate the utilisation of a multi-threading software-based countermeasure to mitigate Side Channel Analysis (SCA) attacks, with a particular focus on the AES-128 cryptographic algorithm. This investigation is novel, as there has not been a software-based countermeasure relying on multi-threading to our knowledge. The research has been tested on the Atmel microcontrollers, as well as a more fully featured system in the form of the popular Raspberry Pi that utilises the ARM7 processor. The main contributions of this research is the introduction of a multi-threading software based countermeasure used to mitigate SCA attacks on both an embedded device and a Raspberry Pi. These threads are comprised...
The EM side channel analysis is a very effective technique to attack cryptographic systems due to it...
Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
This research is the first of its kind to investigate the utilisation of a multi-threading software-...
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a process...
Hardware security is essential in keeping sensitive information private. Because of this, it’s imper...
Side Channel Analysis (SCA) is composed of a bunch of techniques employed to extract secret informat...
Modern side-channel attacks (SCA) have the ability to reveal sensitive data from non-protected hardw...
In the recent years the number of interconnected devices involved in our life is rapidly growing. Th...
Protecting software implementations of block ciphers from side channel attacks is a sign...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
As side-channel attacks reached general purpose PCs and started to be more practical for attackers t...
Side-channel analysis (SCA) is a prominent tool to break mathematically secure cryptographic engines...
The EM side channel analysis is a very effective technique to attack cryptographic systems due to it...
Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...
This research is the first of its kind to investigate the utilisation of a multi-threading software-...
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a process...
Hardware security is essential in keeping sensitive information private. Because of this, it’s imper...
Side Channel Analysis (SCA) is composed of a bunch of techniques employed to extract secret informat...
Modern side-channel attacks (SCA) have the ability to reveal sensitive data from non-protected hardw...
In the recent years the number of interconnected devices involved in our life is rapidly growing. Th...
Protecting software implementations of block ciphers from side channel attacks is a sign...
This paper aims at presenting a new countermeasure against Side-Channel Analysis (SCA) attacks, whos...
Side Channel Attacks (SCA) have proven to be a practical threat to the security of embedded systems,...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
As side-channel attacks reached general purpose PCs and started to be more practical for attackers t...
Side-channel analysis (SCA) is a prominent tool to break mathematically secure cryptographic engines...
The EM side channel analysis is a very effective technique to attack cryptographic systems due to it...
Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the...
Context. In applications such as cryptography or real-time systems, formal methods are used to prove...