side-channel attack

kõrvalkanalrünne, külgkanalrünne

olemus
liik krüptosüsteemi või parooli ründeid,
on suunatud mitte algoritmi või parooli nõrkustele,
vaid füüsilise ja/või programmilise teostuse nõrkustele,
põhineb kaasnevate nähtuste uurimisel:
- elektromagnetkiirguse iseloom
- energiatarbe dünaamika
- signaalide ajastus
- soojusmuster jms

ülevaateid
https://en.wikipedia.org/wiki/Side-channel_attack

https://www.springer.com/cda/content/document/cda_downloaddocument/9780387718279-c1.pdf

https://csrc.nist.gov/csrc/media/events/physical-security-testing-workshop/documents/papers/physecpaper19.pdf

http://cacm.acm.org/magazines/2016/6/202646-physical-key-extraction-attacks-on-pcs/fulltext

https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf

https://summerschool-croatia.cs.ru.nl/2016/slides/FX_June%206.pdf

http://www.cse.iitm.ac.in/~chester/courses/16e_cns/slides/07_SCA.pdf

https://www.tandfonline.com/doi/full/10.1080/23742917.2016.1231523

https://arstechnica.com/information-technology/2019/12/scientists-pluck-crypto-keys-from-intels-sgx-by-tweaking-cpu-voltage/

tõrje
https://www.jungledisk.com/blog/2017/12/28/be-aware-of-side-channel-attacks/

https://www.iacr.org/archive/eurocrypt2013/78810139/78810139.pdf

https://www.ijcsmc.com/docs/papers/April2016/V5I4201632.pdf

https://www.darkreading.com/vulnerabilities---threats/side-channel-attacks-and-the-importance-of-hardware-based-security/a/d-id/1331976

https://computerresearch.org/index.php/computer/article/download/1063/1061

http://www.safecrypto.eu/wp-content/uploads/2015/02/SAFEcrypto_D7.1-Approved.pdf

https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-alam.pdf

vt ka
- kõrvalkanal

Toimub laadimine

side-channel attack

kõrvalkanalrünne, külgkanalrünne

olemus
liik krüptosüsteemi või parooli ründeid,
on suunatud mitte algoritmi või parooli nõrkustele,
vaid füüsilise ja/või programmilise teostuse nõrkustele,
põhineb kaasnevate nähtuste uurimisel:
- elektromagnetkiirguse iseloom
- energiatarbe dünaamika
- signaalide ajastus
- soojusmuster jms

ülevaateid
https://en.wikipedia.org/wiki/Side-channel_attack

https://www.springer.com/cda/content/document/cda_downloaddocument/9780387718279-c1.pdf

https://csrc.nist.gov/csrc/media/events/physical-security-testing-workshop/documents/papers/physecpaper19.pdf

http://cacm.acm.org/magazines/2016/6/202646-physical-key-extraction-attacks-on-pcs/fulltext

https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf

https://summerschool-croatia.cs.ru.nl/2016/slides/FX_June%206.pdf

http://www.cse.iitm.ac.in/~chester/courses/16e_cns/slides/07_SCA.pdf

https://www.tandfonline.com/doi/full/10.1080/23742917.2016.1231523

https://arstechnica.com/information-technology/2019/12/scientists-pluck-crypto-keys-from-intels-sgx-by-tweaking-cpu-voltage/

tõrje
https://www.jungledisk.com/blog/2017/12/28/be-aware-of-side-channel-attacks/

https://www.iacr.org/archive/eurocrypt2013/78810139/78810139.pdf

https://www.ijcsmc.com/docs/papers/April2016/V5I4201632.pdf

https://www.darkreading.com/vulnerabilities---threats/side-channel-attacks-and-the-importance-of-hardware-based-security/a/d-id/1331976

https://computerresearch.org/index.php/computer/article/download/1063/1061

http://www.safecrypto.eu/wp-content/uploads/2015/02/SAFEcrypto_D7.1-Approved.pdf

https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-alam.pdf

vt ka
- kõrvalkanal

Palun oodake...

Tõrge

side-channel attack

kõrvalkanalrünne, külgkanalrünne

olemus
liik krüptosüsteemi või parooli ründeid,
on suunatud mitte algoritmi või parooli nõrkustele,
vaid füüsilise ja/või programmilise teostuse nõrkustele,
põhineb kaasnevate nähtuste uurimisel:
- elektromagnetkiirguse iseloom
- energiatarbe dünaamika
- signaalide ajastus
- soojusmuster jms

ülevaateid
https://en.wikipedia.org/wiki/Side-channel_attack

https://www.springer.com/cda/content/document/cda_downloaddocument/9780387718279-c1.pdf

https://csrc.nist.gov/csrc/media/events/physical-security-testing-workshop/documents/papers/physecpaper19.pdf

http://cacm.acm.org/magazines/2016/6/202646-physical-key-extraction-attacks-on-pcs/fulltext

https://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications.pdf

https://summerschool-croatia.cs.ru.nl/2016/slides/FX_June%206.pdf

http://www.cse.iitm.ac.in/~chester/courses/16e_cns/slides/07_SCA.pdf

https://www.tandfonline.com/doi/full/10.1080/23742917.2016.1231523

https://arstechnica.com/information-technology/2019/12/scientists-pluck-crypto-keys-from-intels-sgx-by-tweaking-cpu-voltage/

tõrje
https://www.jungledisk.com/blog/2017/12/28/be-aware-of-side-channel-attacks/

https://www.iacr.org/archive/eurocrypt2013/78810139/78810139.pdf

https://www.ijcsmc.com/docs/papers/April2016/V5I4201632.pdf

https://www.darkreading.com/vulnerabilities---threats/side-channel-attacks-and-the-importance-of-hardware-based-security/a/d-id/1331976

https://computerresearch.org/index.php/computer/article/download/1063/1061

http://www.safecrypto.eu/wp-content/uploads/2015/02/SAFEcrypto_D7.1-Approved.pdf

https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-alam.pdf

vt ka
- kõrvalkanal

Andmete allalaadimisel või töötlemisel esines tehniline tõrge.
Vabandame!