Sciweavers

EIT
2008
IEEE

Experiments in attacking FPGA-based embedded systems using differential power analysis

14 years 1 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer security community. Research into countermeasures for these cryptographic systems has intensified as well. Experiments have been conducted showing the potential effectiveness of power analysis attacks and preventative techniques on both software (e.g. smartcard, DSP) and hardware (e.g. ASIC, FPGA) processing elements. One key observation that motivates our work is that the majority of the research into power analysis on FPGA-based cryptographic systems has been a) theoretical in nature, b) evaluated through simulation, or c) experimented using custom hardware that does not closely mirror real-world systems. In this paper, we look to bridge this gap between theory and practice by detailing our experience in performing a Differential Power Analysis (DPA) attack on a commercial FPGA development board. We present an aut...
Song Sun, Zijun Yan, Joseph Zambreno
Added 19 Oct 2010
Updated 19 Oct 2010
Type Conference
Year 2008
Where EIT
Authors Song Sun, Zijun Yan, Joseph Zambreno
Comments (0)