Skip to Main content Skip to Navigation

Optimization methods for side channel attacks

Abstract : The security of modern embedded systems has been the subject of intensive research in engineering areas. Recent threats called Side-Channel Analysis (SCA) have attracted much attention in embedded security areas. SCAs are passive attacks, in that the device under attack is not aware of its leaks being recorded. Therefore, the need of securing and evaluating the robustness of embedded systems against SCAs becomes obvious. Basically, four aspects of security evaluation analysis should be taken into consideration: the acquisition of Side-channel traces, the preprocessing of traces acquired, the detection and extraction of cryptographic patterns from the preprocessed traces, and finally the recovery of sensitive information, referred to as the secret key. This thesis investigates new techniques in the analysis of systems for Side-channel attacks.It considers how evaluation targets are characterized, how their behaviour may be simulated -- in order to hone targets for empirical analysis and then how data can be collected and analysed. The overall goal is the establishment of a methodological basis for this work. The first part of this thesis focuses on physical cryptanalysis. Several solutions and generic Side-channel attacks are addressed. The second part of this thesis is devoted to the pre-processing of the Side-channel leaked information. We propose new techniques and efficient pre-processing algorithms to get rid off the issues related principally to the noise and de-synchronisation problems.In the last part of this thesis, we establish a methodological framework, which aims at best organizing the task of the evaluator.We also highlight common pitfalls made by evaluators.
Document type :
Complete list of metadata

Cited literature [131 references]  Display  Hide  Download
Contributor : Youssef Souissi Connect in order to contact the contributor
Submitted on : Thursday, March 22, 2012 - 9:25:53 AM
Last modification on : Tuesday, September 21, 2021 - 2:06:17 PM
Long-term archiving on: : Wednesday, December 14, 2016 - 5:31:45 PM


  • HAL Id : pastel-00681665, version 1


Youssef Souissi. Optimization methods for side channel attacks. Embedded Systems. Télécom ParisTech, 2011. English. ⟨pastel-00681665⟩



Record views


Files downloads