Overview
Explore practical side-channel attacks on embedded device cryptography in this 52-minute talk by Dr Owen Lo and Doug Carson from The Cyber Academy. Delve into the history, techniques, and real-life examples of side-channel attacks, including Simple Power Analysis, Differential Power Analysis, and Correlation Power Analysis. Learn about the biggest problems in embedded device security, industry interconnect standards, and the use of oscilloscopes for interface analysis. Examine the AES-128 attack methodology and power models, gaining insights into the vulnerabilities of embedded systems and the importance of robust cryptographic implementations.
Syllabus
Intro
Agenda
Why are we interested
The biggest problem
The hypothesis
Who cares
Maturity
Keysight
Endpoint devices
Embedded devices
Industry interconnect standards
Sidechannel attacks
History of sidechannel
Oscilloscope
Techniques
Interface analysis
The black box
Data analysis
Dr Owen Lo
Simple Power Analysis SP
Differential Power Analysis SP
Correlation Power Analysis
Aes128 attack
How it works
Reallife example
Power models
Taught by
The Cyber Academy