tailieunhanh - An overview of acoustic side channel attack
This paper focuses on acoustic side-channel attack and surveys the methods and techniques employed in the attack; we will also see some of the different devices which can be under the threat of such attack and finally countermeasures against this attack, which helps in reducing the risk. | ISSN:2249-5789 Deepa G M et al , International Journal of Computer Science & Communication Networks,Vol 3(1), 15-20 An Overview of Acoustic Side-Channel Attack Deepa ., G. SriTeja & Professor S. Venkateswarlu Department of Computer Science & Engineering KL University, Andhra Pradesh, India Abstract Need for security is an important aspect in protecting private information. Side channel attacks are a recent class of attacks that is very powerful in practice. Most side-channel attack research has focused on electromagnetic emanations (TEMPEST) and power consumption however; one of the oldest eavesdropping channels is acoustic emanations. This paper focuses on acoustic side-channel attack and surveys the methods and techniques employed in the attack; we will also see some of the different devices which can be under the threat of such attack and finally countermeasures against this attack, which helps in reducing the risk. 1. Introduction Invasive attack: this attack involves tampering device to get direct access to internal components. Semi-invasive attack: this kind of attack involves access to device but without making any direct contact with device for example, fault-based attack. Non-invasive attack: this attack involves close observation on externally available information which is often unintentionally leaked. Examples like electromagnetic attack, power attack and acoustics attack. Visible Light Power consumption ExecutionTime Embedded Cryptographic device Security is the main concern of privacy and it is as strong as weakest link. We live in a world in which all the sensitive data is controlled and distributed using computer system. There has been put much effort in protecting this information with a wide array of cryptographic schemes, protocols and security systems, but there are still many concerns for systems in which the physical implementations can be accessed. For example, system like ATM’s which we use in everyday life is vulnerable to .
đang nạp các trang xem trước