[PDF][PDF] On the Influence of the Laser Illumination on the Logic Cells Current Consumption
Physical side-channel attacks represent a great challenge for today's chip design. Although
attacks on CMOS dynamic power represent a class of state-of-the-art attacks, many other
effects potentially affect the security of CMOS chips analogously by affecting mostly static
behaviour of the chip, including aging, ionizing radiation, or non-ionizing illumination of the
CMOS. Vulnerabilities exploiting data dependency in CMOS static power were already
demonstrated in practice and the analogous vulnerability exploiting light-modulated static …
attacks on CMOS dynamic power represent a class of state-of-the-art attacks, many other
effects potentially affect the security of CMOS chips analogously by affecting mostly static
behaviour of the chip, including aging, ionizing radiation, or non-ionizing illumination of the
CMOS. Vulnerabilities exploiting data dependency in CMOS static power were already
demonstrated in practice and the analogous vulnerability exploiting light-modulated static …
On the Influence of the Laser Illumination on the Logic Cells Current Consumption: First measurement results
Physical side-channel attacks represent a great challenge for today's chip design. Although
attacks on CMOS dynamic power represent a class of state-of-the-art attacks, many other
effects potentially affect the security of CMOS chips analogously by affecting mostly static
behaviour of the chip, including aging, ionizing radiation, or non-ionizing illumination of the
CMOS. Vulnerabilities exploiting data dependency in CMOS static power were already
demonstrated in practice and the analogous vulnerability exploiting light-modulated static …
attacks on CMOS dynamic power represent a class of state-of-the-art attacks, many other
effects potentially affect the security of CMOS chips analogously by affecting mostly static
behaviour of the chip, including aging, ionizing radiation, or non-ionizing illumination of the
CMOS. Vulnerabilities exploiting data dependency in CMOS static power were already
demonstrated in practice and the analogous vulnerability exploiting light-modulated static …
Showing the best results for this search. See all results