Practical side-channel attack on a security device.
Manuel San PedroVictor ServantCharles GuillemetPublished in: ICM (2019)
Keyphrases
- countermeasures
- security measures
- information security
- cyber attacks
- power analysis
- security issues
- fault injection
- security vulnerabilities
- secret key
- denial of service attacks
- key exchange protocol
- authentication protocol
- malicious users
- security protocols
- information systems
- buffer overflow
- malicious attacks
- real world
- security risks
- security management
- dos attacks
- authentication mechanism
- key agreement
- malicious activities
- identity theft
- sql injection
- forensic analysis
- security problems
- java card
- cyber security
- computer security
- sensitive data
- security requirements
- statistical databases
- smart card
- intrusion detection