Abstract
Alice and Bob, our two heroes, realized that there may be more backdoors than they expected. And when designing a secure system, they certainly cannot ignore them. Principally, our purpose was not to propose new physical leakages of embedded systems, but rather we intended to provide a thorough survey of two of them, namely the power and the electromagnetic emanations. In this respect, we investigated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Messerges, T. S. (2000). Using second-order power analysis to attack DPA resistant software. In Ç. K. Koç & C. Paar (Eds.), CHES, volume 1965 of Lecture Notes in Computer Science (pp. 238–251). Berlin: Springer.
Standaert, F.-X., Malkin, T. G., & Yung, M. (2006). A Formal Practice-Oriented Model for the Analysis of Side-Channel Attacks. IACR e-print archive 2006/134.
Tuyls, P., Schrijen, G. J., Skoric, B., van Geloven, J., Verhaegh, N., & Wolters, R. (2006). Read-proof hardware from protective coatings. In L. Goubin & M. Matsui (Eds.), CHES, volume 4269 of Lecture Notes in Computer Science (pp. 369–383). Berlin: Springer.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Peeters, E. (2013). General Conclusion and Possible Further Directions. In: Advanced DPA Theory and Practice. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6783-0_9
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6783-0_9
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6782-3
Online ISBN: 978-1-4614-6783-0
eBook Packages: EngineeringEngineering (R0)