From Embedded Lab Vienna for IoT & Security
Jump to navigation
Jump to search
Summary
Introduction
Types of side-channel attacks
Timing attacks
Cache-Timing Analysis
Electromagnetic attacks
Simple Electromagnetic Analysis
Differential Electromagnetic Analysis
Power-monitoring attacks
Simple Power Analysis
Differential Power Analysis
Correlation Power Analysis
Template Power Analysis
Countermeasures
Masking
Hiding
References