The security issues of devices, used in the Internet of Things (IoT) for example, can be considered in two contexts. On the one hand, these algorithms can be proven secure mathematically. On the other hand, physical attacks can weaken the implementation. In this work, we want to compare these attacks between them. A tool to evaluate and compare different physical attacks, by separating the theoretical attack path and the experimental parts of the attacks, is presented.
CITATION STYLE
Le Bouder, H., Thomas, G., Lashermes, R., Linge, Y., Robisson, B., & Tria, A. (2018). An evaluation tool for physical attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 11104 LNCS, pp. 112–119). Springer Verlag. https://doi.org/10.1007/978-3-030-00247-3_10
Mendeley helps you to discover research relevant for your work.