Side-channel attacks and countermeasures for embedded microcontrollers

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

While trustworthy hardware helps to establish the basis of trustworthy computing, most applications in embedded security rely to a significant extent on software. Smart-cards are an excellent example. A smart-card is an embedded computer in the form factor of a credit card with an integrated microcontroller. In contrast to a credit card, a smart-card thus has an active component. This allows the card to execute one side of a cryptographic protocol, such as digital signature-generation. Crypto-protocols are build using crypto-algorithms including symmetric-key and public-key encryption, random number generation, and hashing. A smart-card may implement these building blocks in software or, in some cases, in dedicated hardware. Software is often preferred because of two different reasons: reducing the design cost and supporting flexibility. This chapter will discuss the implementation of side-channel attacks on such microcontrollers, as well as some common countermeasures. The objective is to introduce the reader to this exciting field of research within the limits of a book chapter. In-depth discussion of side-channel analysis on microcontrollers can be found in the literature, e.g., [1].

Cite

CITATION STYLE

APA

Schaumont, P., & Chen, Z. (2012). Side-channel attacks and countermeasures for embedded microcontrollers. In Introduction to Hardware Security and Trust (Vol. 9781441980809, pp. 263–282). Springer New York. https://doi.org/10.1007/978-1-4419-8080-9_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free