As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
In this paper, we presented vulnerabilities and countermeasures for em- bedded processors. Among all kinds of vulnerabilities and external attacks, we are most interested in power attacks, which infer program behavior from observing power supply current into an embedded processor core, are important forms of security attacks. In this work, we addressed a novel approach against the power attacks, i.e., Dynamic Voltage and Frequency Switching (DVFS). Results showed that this method hides processor state with 27% energy reduction and 16% time overhead for DES encryption and decryption algorithms. Furthermore, system leakage power, as an obstacle to power attacks in the future technology, was studied. Results showed that leakage power scaling makes the power analysis really difficult to be carried out and leaves crypto embedded processors secure without any kind of overheads.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.