This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Temperature Attacks
March/April 2009 (vol. 7 no. 2)
pp. 79-82
Julien Brouchier, Institut supérieur de l'électronique et du numérique
Tom Kean, Algotronix
Carol Marsh, Algotronix
David Naccache, École normale supérieure
This column describes practical experiments where information was covertly transmitted via heat dissipation from machine to machine, from process to process, and from chip part to chip part.

1. B. Lampson, "A Note on the Confinement Problem," Comm. ACM, vol. 16, no. 10, 1973, pp. 613–615.
2. S. Zander and S. Murdoch, "An Improved Clock-Skew Measurement Technique for Revealing Hidden Services," Proc. 17th Usenix Security Symp., Usenix Assoc., 2008, pp. 211–225.
3. T. Huffmire et al., "Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems," Proc. IEEE Symp. Security and Privacy (SP 07), IEEE CS Press, 2007, pp. 281–295.
4. M. McLean and J. Moore, "FPGA-Based Single Chip Cryptographic Solution," Military Embedded Systems, Mar. 2007, pp. 34–37.
5. A. Shamir and E. Tromer, "Acoustic Cryptanalysis—on Nosy People and Noisy Machines"; http://people.csail.mit.edu/tromeracoustic .
6. D. Naccache, "Finding Faults," IEEE Security &Privacy, vol. 3, no. 5, 2005, pp. 61–65.

Index Terms:
temperature, covert channel, information leakage, side channel, attack, heat, crypto corner
Citation:
Julien Brouchier, Tom Kean, Carol Marsh, David Naccache, "Temperature Attacks," IEEE Security & Privacy, vol. 7, no. 2, pp. 79-82, March-April 2009, doi:10.1109/MSP.2009.54
Usage of this product signifies your acceptance of the Terms of Use.