AttacksOnSecureMicrocontrollersAndSmartcards

From EurAsiaWiki

Jump to: navigation, search

Contents

On a New Way to Read Data from Memory

David Samyde(1), Sergei Skorobogatov(2), Ross Anderson(2) and Jean-Jacques Quisquater(1), 1: Universite catholique de Louvain, UCL Crypto Group Place du Levant, 3, B-1348 Louvain-la-Neuve, Belgium 2: Computer Laboratory, JJ Thompson Avenue, Cambridge CB3 0FD, England;

http://www.cl.cam.ac.uk/ftp/users/rja14/SISW02.pdf


Optical Fault Induction Attacks

SP Skorobogatov, RJ Anderson, Cryptographic Hardware and Embedded Systems 2002, Springer Lecture. Notes in Computer Science, to appear;

http://www.cl.cam.ac.uk/ftp/users/rja14/faultpap3.pdf


Data Remanence in Semiconductor Devices

P Gutmann, 10th USENIX Security Symposium 2001;

http://www.usenix.org/events/sec01/full_papers/gutmann/gutmann.pdf


Low temperature data remanence in static RAM

SP Skorobogatov, Technical report UCAM-CL-TR-536, University of Cambridge Computer Laboratory, June 2002;

http://www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-536.pdf


Tamper Resistance - a Cautionary Note

RJ Anderson, MG Kuhn, in Proceedings of the Second Usenix Workshop on Electronic Commerce (Nov 96) pp 1�11;

http://www.cl.cam.ac.uk/users/rja14/tamper.html


Design Principles for Tamper-Resistant Security Processors

O Kommerling, MG Kuhn, USENIX Workshop on Smartcard Technology 1999;

http://www.cl.cam.ac.uk/Research/Security/tamper/


Differential Power Analysis

P Kocher, J Jaffe and B Jun, In M. Wiener, editor, Advances in Cryptology - CRYPTO'99, vol. 1666 of Lecture Notes in Com puter Science, pp. 388-397,Springer Verlag, 1999. Also available at:

http://www.cryptography.com/dpa


Improving Smart Card Security Using Self-Timed Circuits

S Moore, R Anderson, P Cunningham, R Mullins, G Taylor, in Proceedings Async 2002 pp 211�218;

http://www.cl.cam.ac.uk/ftp/users/rja14/async2002paperV2.pdf


Personal tools