Skip to main content
  • Book
  • © 2013

Advanced DPA Theory and Practice

Towards the Security Limits of Secure Embedded Circuits

Authors:

  • Discusses practical aspects of side-channel attacks on secure embedded device
  • Examines different possible statistical classification tools
  • Covers a theoretical framework that allows one to characterize both the leakage function and the adversary’s strength
  • Includes supplementary material: sn.pub/extras

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (9 chapters)

  1. Front Matter

    Pages i-xvi
  2. General Introduction

    • Eric Peeters
    Pages 1-7
  3. Secure Embedded Devices and Their Side Channels

    1. Front Matter

      Pages 9-9
  4. Techniques of Measurements

    1. Front Matter

      Pages 21-21
    2. Measurement of the Power Consumption

      • Eric Peeters
      Pages 41-54
    3. Electromagnetic Leakage

      • Eric Peeters
      Pages 55-69
  5. Statistical Tools and Higher Order Attacks

    1. Front Matter

      Pages 71-71
    2. Statistical Tools

      • Eric Peeters
      Pages 73-96
    3. Higher Order Attacks

      • Eric Peeters
      Pages 97-108
  6. Towards Theoretical Prediction of Side-Channel Analysis

    1. Front Matter

      Pages 109-109
  7. Back Matter

    Pages 133-139

About this book

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

Authors and Affiliations

  • Texas Instruments Inc., Frisco, USA

    Eric Peeters

About the author

Eric Peeters, Ph.D is a Security Architect at Texas Instruments Inc.

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access