Securing Power Side Channels by Design

Doctoral Thesis (2024)
Author(s)

Abdullah Aljuffri (TU Delft - Computer Engineering)

Contributor(s)

S. Hamdioui – Promotor (TU Delft - Computer Engineering)

Mottaqiallah Taouil – Copromotor (TU Delft - Computer Engineering)

Research Group
Computer Engineering
Copyright
© 2024 A.A.M. Aljuffri
More Info
expand_more
Publication Year
2024
Language
English
Copyright
© 2024 A.A.M. Aljuffri
Research Group
Computer Engineering
ISBN (print)
978-94-6384-544-1
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The security of electronic devices holds the greatest importance in the modern digital era, with one of the emerging challenges being the widespread occurrence of hardware attacks. The aforementioned attacks present a substantial risk to hardware devices, and it is of utmost importance to comprehend the potential detrimental effects they may cause. Side-channel attacks are a class of hardware attacks that exploit information unintentionally leaked by a device during its operation. These leaks manifest in various forms, including power consumption, time variations, and thermal dissipation. The fundamental danger posed by side-channel attacks is their ability to infer sensitive information from these unintended emissions. To address the heightened risks associated with side-channel attacks, this thesis focuses on three main research topics.

Files

License info not available