calender
Date & Time
Search
Datum
{{range.dates[index].day}}
{{range.dates[index].date}}
Time
Mornings Noon Afternoons Evenings
  • from
  • to
  • o'clock
Topic
Event
Properties
{{item.name}}
{{item.name}}
Exhibition venue

(please choose the desired areas)

Lecture language
Format

Event database

The event database contains all event-related information for the digital electronica conference and supporting event program.

Back to the EventList

Differential Power Analysis - a Gamechanger for Attacking IoT Devices

NOV
12
2020
12. NOV 2020

Lecture electronica Conferences > Wireless Congress > Session 11: Security

15:40-16:05 h | Virtual

Differential Power Analysis (DPA) is a side-channel attack based on a statistical method of analyzing a device’s power consumption to identify data dependent correlations. These correlations can be used to leak, for example, keying material without requiring an exploit for the underlying algorithms or protocols. This session will detail the concept of side-channel attacks, followed by simple power analysis (SPA) and finally differential power analysis. Results based on power measurements from an experimental side-channel attack will be presented. The main takeaway of this introductory is that DPA is something that is available even to hobbyists today. After a brief explanation on the math behind DPA and SPA, the focus will shift to suitable countermeasures in hardware, software and system design. Hardware countermeasures are mostly left to implement by IC manufacturers, but there are a number of things developers and more importantly system architects can do to thwart side-channel attacks.

Subjects: Wireless

Speaker: Marius Munder (Silicon Labs)

Type: Lecture

Speech: English

Notifiable

Chargeable

Login

Differential Power Analysis (DPA) is a side-channel attack based on a statistical method of analyzing a device’s power consumption to identify data dependent correlations. These correlations can be used to leak, for example, keying material without requiring an exploit for the underlying algorithms or protocols. This session will detail the concept of side-channel attacks, followed by simple power analysis (SPA) and finally differential power analysis. Results based on power measurements from an experimental side-channel attack will be presented. The main takeaway of this introductory is that DPA is something that is available even to hobbyists today. After a brief explanation on the math behind DPA and SPA, the focus will shift to suitable countermeasures in hardware, software and system design. Hardware countermeasures are mostly left to implement by IC manufacturers, but there are a number of things developers and more importantly system architects can do to thwart side-channel attacks.

Speaker,
Silicon Labs

Marius Munder

Marius Munder

Silicon Labs

Show Profile

Informations

Speaker,
Silicon Labs

Marius Munder
Marius Munder

Location

Eingang
Nord-West
ICM
Eingang
Nord
Eingang
West
Atrium
Eingang
Nord-Ost
Eingang
Ost
Conference
Center Nord
Freigelände
C1
C2
C3
C4
C5
C6
B0
B1
B2
B3
B4
B5
B6
A1
A2
A3
A4
A5
A6

More Events