Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Electromagnetic Side-Channel Attacks and Potential Countermeasures

CAE in Cybersecurity Community via YouTube

Overview

Explore electromagnetic side-channel attacks and potential countermeasures in this 28-minute lecture by Tristen Mullins from the University of South Alabama. Delve into cryptographic algorithms, power versus electromagnetic side-channels, and localized electromagnetic analysis. Learn about differential EM analysis, trace collection techniques, and the importance of probe placement and pre-processing. Discover methods for aligning traces, including static alignment, and examine various side-channel countermeasures. Gain insights into EMA countermeasures, spatial randomization for localized EM, and moving target defense strategies. Conclude with an overview of ongoing work in this critical area of cybersecurity.

Syllabus

Intro
Cryptographic Algorithms
Power vs EM Side-Channels
Localized EMA
Electromagnetic SCA Attacks
Differential EM Analysis
Trace Collection: Localized EM
Trace Collection: Probe Placement
Trace Collection: Pre-Processing
Aligning Traces
Static Alignment
Side-Channel Countermeasures
EMA Countermeasures
Localized EM: Spatial Randomization
Moving Target Defense
Ongoing Work

Taught by

CAE in Cybersecurity Community

Reviews

Start your review of Electromagnetic Side-Channel Attacks and Potential Countermeasures

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.