towards the security limits of secure embedded circuits /
First Statement of Responsibility
Eric Peeters
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
New York, NY :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
c2013
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and index
SUMMARY OR ABSTRACT
Text of Note
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate