July 27, 2023, 1:10 a.m. | Gabriel Klasson Landin, Truls Jilborg

cs.CR updates on arXiv.org arxiv.org

Side-channel attacks pose significant challenges to the security of embedded
systems, often allowing attackers to circumvent encryption algorithms in
minutes compared to the trillions of years required for brute-force attacks. To
mitigate these vulnerabilities, various countermeasures have been developed.
This study focuses on two specific countermeasures: randomization of the
encryption algorithm's clock and the incorporation of a dummy core to disguise
power traces.


The objective of this research is to identify the optimal frequencies that
yield the highest level of …

algorithms attackers attacks brute brute-force challenges channel countermeasures embedded embedded systems encryption randomization sca security side-channel side-channel attacks study systems vulnerabilities

Security Specialist

@ Nestlé | St. Louis, MO, US, 63164

Cybersecurity Analyst

@ Dana Incorporated | Pune, MH, IN, 411057

Sr. Application Security Engineer

@ CyberCube | United States

Linux DevSecOps Administrator (Remote)

@ Accenture Federal Services | Arlington, VA

Cyber Security Intern or Co-op

@ Langan | Parsippany, NJ, US, 07054-2172

Security Advocate - Application Security

@ Datadog | New York, USA, Remote