Research Article
A Framework for Acquiring and Analyzing Traces from Cryptographic Devices
192 downloads
@INPROCEEDINGS{10.1007/978-3-319-78816-6_20, author={Alfonso Blanco Blanco and Jose Fuentes and Lorena Gonz\^{a}lez-Manzano and Luis Hern\^{a}ndez Encinas and Agust\^{\i}n Mart\^{\i}n Mu\`{o}oz and Jos\^{e} Rodrigo Oliva and J. S\^{a}nchez Garc\^{\i}a}, title={A Framework for Acquiring and Analyzing Traces from Cryptographic Devices}, proceedings={Security and Privacy in Communication Networks. SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22--25, 2017, Proceedings}, proceedings_a={SECURECOMM \& ATCS \& SEPRIOT}, year={2018}, month={4}, keywords={Android Power consumption RSA traces Side-channel attack Smartphone}, doi={10.1007/978-3-319-78816-6_20} }
- Alfonso Blanco Blanco
Jose Fuentes
Lorena González-Manzano
Luis Hernández Encinas
Agustín Martín Muñoz
José Rodrigo Oliva
J. Sánchez García
Year: 2018
A Framework for Acquiring and Analyzing Traces from Cryptographic Devices
SECURECOMM & ATCS & SEPRIOT
Springer
DOI: 10.1007/978-3-319-78816-6_20
Abstract
We present a Side-Channel Analysis Platform (SCAP) Framework developed to acquire and study the traces derived from a cryptographic device when cryptographic computations are done. The main goal of this work is to develop a tool for performing side-channel attacks against these cryptographic devices. The characteristics of the SCAP Framework are described and a case study with a smartphone is presented.
Copyright © 2017–2024 EAI