Cioffi, Antonella (2021) Enhanced attacks and security assessment based on leakage measurements in embedded devices. [Tesi di dottorato]
Preview |
Text
Cioffi_Antonella_34.pdf Download (6MB) | Preview |
Item Type: | Tesi di dottorato |
---|---|
Resource language: | English |
Title: | Enhanced attacks and security assessment based on leakage measurements in embedded devices |
Creators: | Creators Email Cioffi, Antonella antonella.cioffi@unina.it |
Date: | 13 December 2021 |
Number of Pages: | 93 |
Institution: | Università degli Studi di Napoli Federico II |
Department: | Ingegneria Elettrica e delle Tecnologie dell'Informazione |
Dottorato: | Information technology and electrical engineering |
Ciclo di dottorato: | 34 |
Coordinatore del Corso di dottorato: | nome email Riccio, Daniele daniele.riccio@unina.it |
Tutor: | nome email Arpaia, Pasquale UNSPECIFIED |
Date: | 13 December 2021 |
Number of Pages: | 93 |
Keywords: | Security; side-channel attack; cryptography; |
Settori scientifico-disciplinari del MIUR: | Area 09 - Ingegneria industriale e dell'informazione > ING-INF/07 - Misure elettriche e elettroniche |
Date Deposited: | 31 Jan 2022 09:36 |
Last Modified: | 28 Feb 2024 12:04 |
URI: | http://www.fedoa.unina.it/id/eprint/14277 |
Collection description
This thesis focuses on the study of the Internet of Things devices security against two typologies of side-channel attacks (SCAs): power measurements-based and timing measurements-based attacks. In particular, three aspects of the IoT security against SCA are faced: (i) improvement of power attack efficiency, (ii) improvement of Vulnerability Assessments tests, and (iii) techniques for robustness evaluation of cryptographic algorithms. The improvement of power attack efficiency is aimed at decreasing the effort and the time needed to find the secret key of the cryptographic algorithm. To this aim, an enhanced version of the power attack was realized by increasing the signal-to-noise ratio (SNR) of the power traces before applying statistical operations. For the improvement of Vulnerability Assessments tests, needed to evaluate the robustness of IoT devices respect to the side-channel attacks, a method for assessing the security at varying the power countermeasures is proposed. The method provides a metric to express the effectiveness of a countermeasure in straightening the IoT transducers security, and it is able to identify the most effective countermeasure. As concerns the techniques for the robustness evaluation of cryptographic algorithms, an experimental test of robustness to timing attack is reported for the asymmetric cryptographic algorithm most used in Internet of Things framework, i.e. the Elliptic Curve Digital Signature Algorithm (ECDSA).
Downloads
Downloads per month over past year
Actions (login required)
View Item |