LEADER 04970nam 22006735 450 001 9910746970003321 005 20251008162043.0 010 $a3-031-38579-9 024 7 $a10.1007/978-3-031-38579-7 035 $a(MiAaPQ)EBC30766919 035 $a(Au-PeEL)EBL30766919 035 $a(DE-He213)978-3-031-38579-7 035 $a(PPN)272741027 035 $a(MiAaPQ)EBC30765178 035 $a(Au-PeEL)EBL30765178 035 $a(CKB)28446169300041 035 $a(EXLCZ)9928446169300041 100 $a20230930d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aUnderstanding Analog Side Channels Using Cryptography Algorithms /$fby Alenka Zaji?, Milos Prvulovic 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (474 pages) 311 08$aPrint version: Zaji?, Alenka Understanding Analog Side Channels Using Cryptography Algorithms Cham : Springer International Publishing AG,c2023 9783031385780 320 $aIncludes bibliographical references and index. 327 $aPreface -- I Introduction -- Ii What Is An Analog Side Channel? -- Iii Analog Side Channels -- Iv Unintentionally Modulated Side Channels -- V Relationship Between Modulated Side Channels And Program Activity -- Vi Parameters That Affect Analog Side Channels -- Vii Modeling Analog Side Channels as Communication Systems -- Viii Using Analog Side-Channels For Malware Detection -- Ix Using Analog Side Channels For Program Profiling -- X Using Analog Side Channels For Hardware Event Profiling -- Xi Using Analog Side Channels for Hardware/Software Attestation -- Xii Using Analog Side Channels For Hardware Identification -- Xiii Using Analog Side Channels To Attack Cryptographic Implementations -- Xiv Using Analog Side Channels For Hardware Trojan Detection. 330 $aThis book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware identification, and hardware Trojan detection. Side channel is one of the methods for obtaining information about program execution. Traditionally, they are used in computer science to extract information about a key in cryptographic algorithms. What makes them different from other ways of extracting information about program execution is that side channels rely on how a system implements program execution, rather than what the program?s algorithm specifies. Analog side channels are particularly powerful because they are not easy to suppress or detect that someone is collecting information from the system. Although they are very powerful tools, they are poorly understood. This book targets advanced level students in computer science and electrical engineering as a textbook. Researchers and professionals working with analog side channels, how to model them, measure them, improve signal to noise ratio, and invent new signal processing techniques can also use this book. Computer scientists and engineers who want to learn new applications of side channels to improve system security, new techniques for breaking cryptography keys, new techniques for attestation, and new techniques for hardware Trojan detection will also want to purchase this book. 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic circuits 606 $aData protection 606 $aTelecommunication 606 $aCryptology 606 $aElectronic Circuits and Systems 606 $aData and Information Security 606 $aCommunications Engineering, Networks 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aElectronic circuits. 615 0$aData protection. 615 0$aTelecommunication. 615 14$aCryptology. 615 24$aElectronic Circuits and Systems. 615 24$aData and Information Security. 615 24$aCommunications Engineering, Networks. 676 $a005.8 700 $aZajic?$b Alenka$01095140 702 $aPrvulovic$b Milos 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910746970003321 996 $aUnderstanding Analog Side Channels Using Cryptography Algorithms$93574335 997 $aUNINA