TAILIEUCHUNG - An overview of acoustic side channel attack

This paper focuses on acoustic side-channel attack and surveys the methods and techniques employed in the attack; we will also see some of the different devices which can be under the threat of such attack and finally countermeasures against this attack, which helps in reducing the risk. | ISSN:2249-5789 Deepa G M et al , International Journal of Computer Science & Communication Networks,Vol 3(1), 15-20 An Overview of Acoustic Side-Channel Attack Deepa ., G. SriTeja & Professor S. Venkateswarlu Department of Computer Science & Engineering KL University, Andhra Pradesh, India Abstract Need for security is an important aspect in protecting private information. Side channel attacks are a recent class of attacks that is very powerful in practice. Most side-channel attack research has focused on electromagnetic emanations (TEMPEST) and power consumption however; one of the oldest eavesdropping channels is acoustic emanations. This paper focuses on acoustic side-channel attack and surveys the methods and techniques employed in the attack; we will also see some of the different devices which can be under the threat of such attack and finally countermeasures against this attack, which helps in reducing the risk. 1. Introduction Invasive attack: this attack involves tampering device to get direct access to internal components. Semi-invasive attack: this kind of attack involves access to device but without making any direct contact with device for example, fault-based attack. Non-invasive attack: this attack involves close observation on externally available information which is often unintentionally leaked. Examples like electromagnetic attack, power attack and acoustics attack. Visible Light Power consumption ExecutionTime Embedded Cryptographic device Security is the main concern of privacy and it is as strong as weakest link. We live in a world in which all the sensitive data is controlled and distributed using computer system. There has been put much effort in protecting this information with a wide array of cryptographic schemes, protocols and security systems, but there are still many concerns for systems in which the physical implementations can be accessed. For example, system like ATM’s which we use in everyday life is vulnerable to .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.