The event database contains all event-related information for the digital electronica conference and supporting event program.
Lecture electronica Conferences > Wireless Congress > Session 11: Security
15:40-16:05 h | Virtual
Differential Power Analysis (DPA) is a side-channel attack based on a statistical method of analyzing a device’s power consumption to identify data dependent correlations. These correlations can be used to leak, for example, keying material without requiring an exploit for the underlying algorithms or protocols. This session will detail the concept of side-channel attacks, followed by simple power analysis (SPA) and finally differential power analysis. Results based on power measurements from an experimental side-channel attack will be presented. The main takeaway of this introductory is that DPA is something that is available even to hobbyists today. After a brief explanation on the math behind DPA and SPA, the focus will shift to suitable countermeasures in hardware, software and system design. Hardware countermeasures are mostly left to implement by IC manufacturers, but there are a number of things developers and more importantly system architects can do to thwart side-channel attacks.
Subjects: Wireless
Speaker: Marius Munder (Silicon Labs)
Type: Lecture
Speech: English
Notifiable
Chargeable
LoginDifferential Power Analysis (DPA) is a side-channel attack based on a statistical method of analyzing a device’s power consumption to identify data dependent correlations. These correlations can be used to leak, for example, keying material without requiring an exploit for the underlying algorithms or protocols. This session will detail the concept of side-channel attacks, followed by simple power analysis (SPA) and finally differential power analysis. Results based on power measurements from an experimental side-channel attack will be presented. The main takeaway of this introductory is that DPA is something that is available even to hobbyists today. After a brief explanation on the math behind DPA and SPA, the focus will shift to suitable countermeasures in hardware, software and system design. Hardware countermeasures are mostly left to implement by IC manufacturers, but there are a number of things developers and more importantly system architects can do to thwart side-channel attacks.
Speaker,
Silicon Labs
Speaker,
Silicon Labs