USC Classifieds>USC Online Courses>Physical and Advanced Side-Channel Attacks

Physical and Advanced Side-Channel Attacks

About this Course

On the hardware side, we will mount power analysis attacks on the cryptographic algorithms RSA and AES. We will see that simple power analysis attacks and differential power analysis attacks are powerful enough to obtain fine-grained information such as cryptographic keys, user input, or secrets of the operating system. This skill set and knowledge will give you the ability to spot these side channels in hardware and software projects. We will then cover countermeasures and mitigation strategies that allow you to develop side-channel-resilient hardware and software and protect your security-critical applications and sensitive information. On the software side, we will learn about branch prediction an prefetching. We will learn how these mechanisms can be subverted into powerful side-channel attacks. You will need programming skills (C, C++, Python) and we will provide you with the knowledge required beyond these, including basics on hardware design, computer architecture, operating systems, and cryptography. You will learn which attacks are relevant in the concrete environments you are working with, extending to your risk assessment skills. In a set of small exercises, you will demonstrate that you understood the techniques behind simple power analysis, and differential power analysis, as well as prefetch side channels and branch-prediction side channels.

Created by: Graz University of Technology

Level: Intermediate


Related Online Courses

Artificial Intelligence is more than just a collection of brilliant, innovative methods to solve problems. If you are interested in machine learning or are planning to explore it, the course will... more
This course is an introduction to microservices and the TARS framework for beginners. TARS is a new generation distributed microservice applications framework designed to support multiple... more
6.00.2x will teach you how to use computation to accomplish a variety of goals and provides you with a brief introduction to a variety of topics in computational problem solving . This course is... more
We begin with a study of finite automata and the languages they can define (the so-called "regular languages." Topics include deterministic and nondeterministic automata, regular expressions, and... more
Modern software is under constant attack, but many software developers have never been told how to effectively counter those attacks. This course works to solve that problem, by explaining the... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL