000 04787nam a22005895i 4500
001 978-3-031-38579-7
003 DE-He213
005 20240423130142.0
007 cr nn 008mamaa
008 230930s2023 sz | s |||| 0|eng d
020 _a9783031385797
_9978-3-031-38579-7
024 7 _a10.1007/978-3-031-38579-7
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
100 1 _aZajić, Alenka.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aUnderstanding Analog Side Channels Using Cryptography Algorithms
_h[electronic resource] /
_cby Alenka Zajić, Milos Prvulovic.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2023.
300 _aXVI, 467 p. 293 illus., 245 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aPreface -- I Introduction -- Ii What Is An Analog Side Channel? -- Iii Analog Side Channels -- Iv Unintentionally Modulated Side Channels -- V Relationship Between Modulated Side Channels And Program Activity -- Vi Parameters That Affect Analog Side Channels -- Vii Modeling Analog Side Channels as Communication Systems -- Viii Using Analog Side-Channels For Malware Detection -- Ix Using Analog Side Channels For Program Profiling -- X Using Analog Side Channels For Hardware Event Profiling -- Xi Using Analog Side Channels for Hardware/Software Attestation -- Xii Using Analog Side Channels For Hardware Identification -- Xiii Using Analog Side Channels To Attack Cryptographic Implementations -- Xiv Using Analog Side Channels For Hardware Trojan Detection.
520 _aThis book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware identification, and hardware Trojan detection. Side channel is one of the methods for obtaining information about program execution. Traditionally, they are used in computer science to extract information about a key in cryptographic algorithms. What makes them different from other ways of extracting information about program execution is that side channels rely on how a system implements program execution, rather than what the program’s algorithm specifies. Analog side channels are particularly powerful because they are not easy to suppress or detect that someone is collecting information from the system. Although they are very powerful tools, they are poorly understood. This book targets advanced level students in computer science and electrical engineering as a textbook. Researchers and professionals working with analog side channels, how to model them, measure them, improve signal to noise ratio, and invent new signal processing techniques can also use this book. Computer scientists and engineers who want to learn new applications of side channels to improve system security, new techniques for breaking cryptography keys, new techniques for attestation, and new techniques for hardware Trojan detection will also want to purchase this book.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aElectronic circuits.
650 0 _aData protection.
650 0 _aTelecommunication.
650 1 4 _aCryptology.
650 2 4 _aElectronic Circuits and Systems.
650 2 4 _aData and Information Security.
650 2 4 _aCommunications Engineering, Networks.
700 1 _aPrvulovic, Milos.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031385780
776 0 8 _iPrinted edition:
_z9783031385803
776 0 8 _iPrinted edition:
_z9783031385810
856 4 0 _uhttps://doi.org/10.1007/978-3-031-38579-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c185618
_d185618