Buch, Englisch, 467 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 733 g
ISBN: 978-3-031-38581-0
Verlag: Springer International Publishing
Side channel is one of the methods for obtaining information about program execution. Traditionally, they are used in computer science to extract information about a key in cryptographic algorithms. What makes them different from other ways of extracting information about program execution is that side channels rely on how a system implements program execution, rather than what the program’s algorithm specifies. Analog side channels are particularly powerful because they are not easy to suppress or detect that someone is collecting information from the system. Although they are very powerful tools, they are poorly understood.
This book targets advanced level students in computer science and electrical engineering as a textbook. Researchers and professionals working with analog side channels, how to model them, measure them, improve signal to noise ratio, and invent new signal processing techniques can also use this book. Computer scientists and engineers who want to learn new applications of side channels to improve system security, new techniques for breaking cryptography keys, new techniques for attestation, and new techniques for hardware Trojan detection will also want to purchase this book.
Zielgruppe
Graduate
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Technische Wissenschaften Elektronik | Nachrichtentechnik Elektronik Bauelemente, Schaltkreise
Weitere Infos & Material
Preface.- I Introduction.- Ii What Is An Analog Side Channel?.- Iii Analog Side Channels.- Iv Unintentionally Modulated Side Channels.- V Relationship Between Modulated Side Channels And Program Activity.- Vi Parameters That Affect Analog Side Channels.- Vii Modeling Analog Side Channels as Communication Systems.- Viii Using Analog Side-Channels For Malware Detection.- Ix Using Analog Side Channels For Program Profiling.- X Using Analog Side Channels For Hardware Event Profiling.- Xi Using Analog Side Channels for Hardware/Software Attestation.- Xii Using Analog Side Channels For Hardware Identification.- Xiii Using Analog Side Channels To Attack Cryptographic Implementations.- Xiv Using Analog Side Channels For Hardware Trojan Detection.