Skip to main content
Book cover

Advanced DPA Theory and Practice

Towards the Security Limits of Secure Embedded Circuits

  • Book
  • © 2013

Overview

  • Discusses practical aspects of side-channel attacks on secure embedded device
  • Examines different possible statistical classification tools
  • Covers a theoretical framework that allows one to characterize both the leakage function and the adversary’s strength
  • Includes supplementary material: sn.pub/extras

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (9 chapters)

  1. Secure Embedded Devices and Their Side Channels

  2. Techniques of Measurements

  3. Statistical Tools and Higher Order Attacks

  4. Towards Theoretical Prediction of Side-Channel Analysis

Keywords

About this book

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

Authors and Affiliations

  • Texas Instruments Inc., Frisco, USA

    Eric Peeters

About the author

Eric Peeters, Ph.D is a Security Architect at Texas Instruments Inc.

Bibliographic Information

Publish with us