The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2009 vol.7)
pp: 79-82
Julien Brouchier , Institut supérieur de l'électronique et du numérique
Tom Kean , Algotronix
Carol Marsh , Algotronix
David Naccache , École normale supérieure
This column describes practical experiments where information was covertly transmitted via heat dissipation from machine to machine, from process to process, and from chip part to chip part.
temperature, covert channel, information leakage, side channel, attack, heat, crypto corner
Julien Brouchier, Tom Kean, Carol Marsh, David Naccache, "Temperature Attacks", IEEE Security & Privacy, vol.7, no. 2, pp. 79-82, March/April 2009, doi:10.1109/MSP.2009.54
1. B. Lampson, "A Note on the Confinement Problem," Comm. ACM, vol. 16, no. 10, 1973, pp. 613–615.
2. S. Zander and S. Murdoch, "An Improved Clock-Skew Measurement Technique for Revealing Hidden Services," Proc. 17th Usenix Security Symp., Usenix Assoc., 2008, pp. 211–225.
3. T. Huffmire et al., "Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems," Proc. IEEE Symp. Security and Privacy (SP 07), IEEE CS Press, 2007, pp. 281–295.
4. M. McLean and J. Moore, "FPGA-Based Single Chip Cryptographic Solution," Military Embedded Systems, Mar. 2007, pp. 34–37.
5. A. Shamir and E. Tromer, "Acoustic Cryptanalysis—on Nosy People and Noisy Machines"; .
6. D. Naccache, "Finding Faults," IEEE Security &Privacy, vol. 3, no. 5, 2005, pp. 61–65.
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool