This dissertation introduces techniques for passively determining the instructions executed by embedded microcontroller devices. Microcontroller applications are increasingly important for programmed mechanical control, analog sensor input, human interface operations and other roles, and when connected form an Internet of Things (IoT). Their simplicity, programmability, robust I/O, small size, low energy, low cost and widespread uses in vehicles, medical devices, wearables, thermostats, toasters, and myriad smart systems have led to estimates of many tens of billions deployed in the near future. Their ubiquity and importance make them attractive targets for malicious actors. Todays malware often evades detection. This thesis introduces nove...
Modern legal and corporate investigations heavily rely on the field of digital forensics to uncover ...
The design and application of novel physical-layer security techniques have been increasing in the l...
International audienceIn this poster we present a novel approach of using side channel information t...
This dissertation introduces techniques for passively determining the instructions executed by embed...
This dissertation introduces techniques for passively determining the instructions executed by embed...
D.Ing. (Electrical Engineering)Abstract: Power Analysis or Side-Channel Attack aimed at embedded sys...
Recent advances in computer hardware security research have shown that electronic devices are vulner...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Many physical systems control or monitor important applications without the capacity to monitor for ...
This thesis develops methods to identify, quantify, and use information leaked in Electromagnetic (E...
Sensor systems are used every time a microcontroller needs to interact with the physical world. They...
Side-channel analysis is known to be a serious threat for real-world devices. In contrast to classic...
Electronically-initiated explosives can have unintended electromagnetic emissions which propagate th...
Electronically-initiated explosives can have unintended electromagnetic emissions which propagate th...
Modern legal and corporate investigations heavily rely on the field of digital forensics to uncover ...
The design and application of novel physical-layer security techniques have been increasing in the l...
International audienceIn this poster we present a novel approach of using side channel information t...
This dissertation introduces techniques for passively determining the instructions executed by embed...
This dissertation introduces techniques for passively determining the instructions executed by embed...
D.Ing. (Electrical Engineering)Abstract: Power Analysis or Side-Channel Attack aimed at embedded sys...
Recent advances in computer hardware security research have shown that electronic devices are vulner...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Many physical systems control or monitor important applications without the capacity to monitor for ...
This thesis develops methods to identify, quantify, and use information leaked in Electromagnetic (E...
Sensor systems are used every time a microcontroller needs to interact with the physical world. They...
Side-channel analysis is known to be a serious threat for real-world devices. In contrast to classic...
Electronically-initiated explosives can have unintended electromagnetic emissions which propagate th...
Electronically-initiated explosives can have unintended electromagnetic emissions which propagate th...
Modern legal and corporate investigations heavily rely on the field of digital forensics to uncover ...
The design and application of novel physical-layer security techniques have been increasing in the l...
International audienceIn this poster we present a novel approach of using side channel information t...