Understanding Analog Side Channels Using Cryptography Algorithms

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware identification, and hardware Trojan detection.

Author(s): Alenka Zajić; Milos Prvulovic
Publisher: Springer International Publishing
Year: 2023

Language: English
Pages: 799

Cover
Front Matter
1. Introduction
2. What Is an Analog Side Channel?
3. Analog Side Channels
4. Unintentionally Modulated Side Channels
5. Relationship Between Modulated Side Channels and Program Activity
6. Parameters that Affect Analog Side Channels
7. Modeling Analog Side Channels as Communication Systems
8. Using Analog Side-Channels for Malware Detection
9. Using Analog Side Channels for Program Profiling
10. Using Analog Side Channels for Hardware Event Profiling
11. Using Analog Side Channels for Hardware/Software Attestation
12. Using Analog Side Channels for Hardware Identification
13. Using Analog Side Channels to Attack Cryptographic Implementations
14. Using Analog Side Channels for Hardware Trojan Detection
Back Matter