An end-device security under pressure from side-channel and fault attacks

When

01/27/2021 2:00pm

Wednesday 27 January 2021
05:00 am - 05:30 am PT

Add to Calendar 01/27/2021 2:00pm 01/27/2021 2:30pm Europe/Paris An end-device security under pressure from side-channel and fault attacks

This talk highlights the importance of end-device security and secure key handling in hostile environments.

As shown by the demo, a class of attacks, called side-channel and fault analysis, can be applied to extract sensitive information, such as AES keys

and firmware, as well to bypass security measures, e.g., JTAG protection. To apply those attacks, a malicious user needs physical access to an end-device; thus,

only information on one particular device can be extracted. Nevertheless, the extracted information can be used in further attack scenarios. It is important to highlight,

that side-channel and fault attacks can be applied against any class of semiconductor devices, including IoT chips, set-top-boxes, smart cards, general-purpose microcontrollers

and others. To prevent those attacks secret handling shall be performed by secure elements specifically protected against side-channel and fault analysis.

Wednesday 27 January 2021
11:00 pm - 11:30 pm CET

01/27/2021 02:00 pm

Add to Calendar Wednesday 27 January 2021 11:00 pm Wednesday 27 January 2021 11:30 pm Europe/Paris An end-device security under pressure from side-channel and fault attacks

This talk highlights the importance of end-device security and secure key handling in hostile environments.

As shown by the demo, a class of attacks, called side-channel and fault analysis, can be applied to extract sensitive information, such as AES keys

and firmware, as well to bypass security measures, e.g., JTAG protection. To apply those attacks, a malicious user needs physical access to an end-device; thus,

only information on one particular device can be extracted. Nevertheless, the extracted information can be used in further attack scenarios. It is important to highlight,

that side-channel and fault attacks can be applied against any class of semiconductor devices, including IoT chips, set-top-boxes, smart cards, general-purpose microcontrollers

and others. To prevent those attacks secret handling shall be performed by secure elements specifically protected against side-channel and fault analysis.

This talk highlights the importance of end-device security and secure key handling in hostile environments.

As shown by the demo, a class of attacks, called side-channel and fault analysis, can be applied to extract sensitive information, such as AES keys

and firmware, as well to bypass security measures, e.g., JTAG protection. To apply those attacks, a malicious user needs physical access to an end-device; thus,

only information on one particular device can be extracted. Nevertheless, the extracted information can be used in further attack scenarios. It is important to highlight,

that side-channel and fault attacks can be applied against any class of semiconductor devices, including IoT chips, set-top-boxes, smart cards, general-purpose microcontrollers

and others. To prevent those attacks secret handling shall be performed by secure elements specifically protected against side-channel and fault analysis.

Become a partner.

Become part of The Things Conference and get in touch with tens of thousands of LoRaWAN professionals.

Reach out