The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (2009 vol. 7)
ISSN: 1540-7993
pp: 79-82
Julien Brouchier , Institut supérieur de l'électronique et du numérique
Tom Kean , Algotronix
Carol Marsh , Algotronix
David Naccache , École normale supérieure
This column describes practical experiments where information was covertly transmitted via heat dissipation from machine to machine, from process to process, and from chip part to chip part.
temperature, covert channel, information leakage, side channel, attack, heat, crypto corner

D. Naccache, C. Marsh, T. Kean and J. Brouchier, "Temperature Attacks," in IEEE Security & Privacy, vol. 7, no. , pp. 79-82, 2009.
84 ms
(Ver 3.3 (11022016))