3. Physical attacks
Embedded systems are based on a more or less complex hardware layer, which exposes them to numerous so-called "physical" attacks. These are many and varied, and their feasibility depends mainly on the means (hardware equipment, number of available test vectors, physical access), knowledge (access to detailed technical documentation, access to data, experience) and time available to the attacker. After presenting the taxonomy of physical attacks, this section presents the main physical attacks, from the most difficult to the most easily achieved.
3.1 Taxonomy of physical attacks
There are numerous so-called "physical" attacks targeting embedded electronic systems. These can be divided into two distinct groups: active and passive attacks. Active attacks, as their...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Physical attacks
Bibliography
Websites
Collection of reverse engineering examples for integrated circuits
Agence Nationale pour la Sécurité des Systèmes d'Information – ANSSI
French security solutions awarded France...
Events
Conference on Cryptographic Hardware and Embedded Systems (CHES) https://ches.iacr.org/
IEEE International Symposium on hardware Oriented Security and Trust (HOST) http://www.hostsymposium.org/
International Workshop on cryptographic Architectures...
Standards and norms
- Advanced Encryption Standard (AES), Federal Information Processing Standards Publication (FIPS) 197, nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf - FIPS197 - 2001
- ARM Security Technology. Building a secure system using trustzone technology. ARM Limited. - PRD29-GENC-009492C - 2005-2009
- Standard Test Access Port and Boundary – Scan Architecture. - IEEE 1149.1 - 2013
Directory
Manufacturers – Suppliers – Distributors (non-exhaustive list)
Rambus, holder of numerous patents on covert channel attacks (ex-Cryptography Research) https://www.rambus.com/security/
French CESTIs approved to evaluate embedded electronic systems: Serma Safety & Security
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference