Completed
Scenario 1: Key Extraction Attack
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
On Code Execution Tracking via Power Side-Channel
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Microcontroller Unit (MCU) Core of embedded system
- 3 Scenario 1: Key Extraction Attack
- 4 Scenario 2: Control Flow Integrity (CFI)
- 5 Code Execution Tracking
- 6 Execution tracking via Power Side-channel
- 7 Problem Formulation . Given code & power trace of MCU
- 8 Hidden Markov Model (HMM)
- 9 Overall Framework
- 10 Naïve State Definition
- 11 Basic Block as State
- 12 Unequal-length States (Cont'd) 2. Viterbl : recover the most probable state sequence
- 13 Complexity Analysis
- 14 Emission Distribution Design
- 15 Observation Symbol Design
- 16 Signal Extraction
- 17 Calibrated likelihood 1. Sample cach instruction's average likelihood during normal execution
- 18 Evaluation Setup
- 19 Abnormal Execution Tracking
- 20 Conclusion & Future Works