Conferences and supporting programme
Hands on Side Channel Power Analysis
Side channel power analysis allows attackers to bypass 'perfect' cryptography on embedded systems - for example both hardware and software AES256 implementations can be bypassed in minutes, based on fundamental artifacts of the embedded devices. This workshop uses the open-source ChipWhisperer project to demonstrate how the attacks work in practice. Rather than just showing you the theory, this class uses the new ChipWhisperer-Nano hardware (included in course) to perform power analysis in real time and break real embedded AES implementations. The open-source nature of ChipWhisperer means you can then work on a variety of published examples including RSA and fault injection attacks. If you'd like to participate in real time, please bring a laptop with Python & ChipWhisperer installed. Otherwise you can see how power analysis works during the class, and then recreate the attacks with the provided hardware on your own. These advanced attacks have never been so accessible, and no embedded engineer can afford to ignore them if they want to create secure systems.
--- Date: 28.02.2019 Time: 13:30 - 16:30 Location: Conference Counter NCC Ost