Cioffi, Antonella (2021) Enhanced attacks and security assessment based on leakage measurements in embedded devices. [Tesi di dottorato]

[thumbnail of Cioffi_Antonella_34.pdf]
Preview
Text
Cioffi_Antonella_34.pdf

Download (6MB) | Preview
Item Type: Tesi di dottorato
Resource language: English
Title: Enhanced attacks and security assessment based on leakage measurements in embedded devices
Creators:
Creators
Email
Cioffi, Antonella
antonella.cioffi@unina.it
Date: 13 December 2021
Number of Pages: 93
Institution: Università degli Studi di Napoli Federico II
Department: Ingegneria Elettrica e delle Tecnologie dell'Informazione
Dottorato: Information technology and electrical engineering
Ciclo di dottorato: 34
Coordinatore del Corso di dottorato:
nome
email
Riccio, Daniele
daniele.riccio@unina.it
Tutor:
nome
email
Arpaia, Pasquale
UNSPECIFIED
Date: 13 December 2021
Number of Pages: 93
Keywords: Security; side-channel attack; cryptography;
Settori scientifico-disciplinari del MIUR: Area 09 - Ingegneria industriale e dell'informazione > ING-INF/07 - Misure elettriche e elettroniche
Date Deposited: 31 Jan 2022 09:36
Last Modified: 28 Feb 2024 12:04
URI: http://www.fedoa.unina.it/id/eprint/14277

Collection description

This thesis focuses on the study of the Internet of Things devices security against two typologies of side-channel attacks (SCAs): power measurements-based and timing measurements-based attacks. In particular, three aspects of the IoT security against SCA are faced: (i) improvement of power attack efficiency, (ii) improvement of Vulnerability Assessments tests, and (iii) techniques for robustness evaluation of cryptographic algorithms. The improvement of power attack efficiency is aimed at decreasing the effort and the time needed to find the secret key of the cryptographic algorithm. To this aim, an enhanced version of the power attack was realized by increasing the signal-to-noise ratio (SNR) of the power traces before applying statistical operations. For the improvement of Vulnerability Assessments tests, needed to evaluate the robustness of IoT devices respect to the side-channel attacks, a method for assessing the security at varying the power countermeasures is proposed. The method provides a metric to express the effectiveness of a countermeasure in straightening the IoT transducers security, and it is able to identify the most effective countermeasure. As concerns the techniques for the robustness evaluation of cryptographic algorithms, an experimental test of robustness to timing attack is reported for the asymmetric cryptographic algorithm most used in Internet of Things framework, i.e. the Elliptic Curve Digital Signature Algorithm (ECDSA).

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item