Comparison of electromagnetic side-channel energy available to the attacker from different computer systems

2015 IEEE International Symposium on Electromagnetic Compatibility (EMC)(2015)

引用 13|浏览11
暂无评分
摘要
This paper evaluates electromagnetic (EM) side-channel energy (ESE) available to the attacker from several different computer systems. In particular, we present measured ESE for several common instructions executed on a laptop, a desktop, and an FPGA at several different frequencies. The results show that ESE measurements are repeatable across a range of frequencies, and that similar frequencies result in similar ESE. While FPGA ESE is smaller than desktop or laptop ESE, similar trends are found between all three systems. The presented results can be useful to computer designers who wish to find out which parts of the design are most susceptible to EM side-channel vulnerabilities, and to software developers who need to know which variations in program behavior are most likely to allow successful side-channel attacks, especially for behaviors that are consistently vulnerable across processor generations and across processor manufacturers.
更多
查看译文
关键词
electromagnetic side-channel energy,EM side-channel vulnerabilities,ESE measurements,computer systems,FPGA ESE,desktop ESE,laptop ESE,computer designers,software developers,side-channel attacks,processor generations,processor manufacturers
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要