CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
IPA: A New Class of Power Attacks
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Differential Power Analysis in the Presence of Hardware Countermeasures
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Power-Analysis Attack on an ASIC AES implementation
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Automatic code recognition for smart cards using a Kohonen neural network
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
A simple power-analysis (SPA) attack on implementations of the AES key expansion
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Shape analysis for power signal cryptanalysis on secure components
Journal of Systems and Software
Hi-index | 0.00 |
When a secure component executes sensitive operations, the information carried by the power consumption can be used to recover secret information Many different techniques have been developped to recover this secret, but only few of them focus on the recovering of the executed code itself Indeed, the code knowledge acquired through this step of Simple Power Analysis (SPA) can help to identify implementation weaknesses and to improve further kinds of attacks In this paper we present a new approach improving the SPA based on a pattern recognition methodology, that can be used to automatically identify the processed instructions that leak through power consumption We firstly process a geometrical classification with chosen instructions to enable the automatic identification of any sequence of instructions Such an analysis is used to reverse general purpose code executions of a recent secure component.