Model Design and Analysis Simulation for Side-Channel Attacks

Model Design and Analysis Simulation for Side-Channel Attacks

✖ In 2024, Huawei continues to sponsor the China Graduate Innovation Competition, providing a total of nine corporate competition topics in the fields of RF, digital, analog, and EDA algorithms for participating teams to choose from. This year’s Huawei competition topic in the digital direction is: Model design and analysis simulation evaluation of side-channel attacks/fault … Read more

Summary of Side-Channel and Fault Injection Attacks

Summary of Side-Channel and Fault Injection Attacks

This article is contributed by the ChaMd5 Security Team IOT Group. This is a summary of the theoretical knowledge learned recently about side-channel attacks and fault injection. If there are any mistakes or areas for improvement, I hope experts will correct me. First, let’s introduce several common encryption algorithms. Encryption Algorithms RSA Encryption Algorithm RSA … Read more

Fault Injection Attack on FLASH Erasure Process

Fault Injection Attack on FLASH Erasure Process

Comprehensive Analysis of Chip Debug Interface Protection Mechanisms Author | Liu Zheng Editor | Liu Mengdi 1. Background Introduction Microcontrollers are the backbone of the modern interconnected world, with widespread applications in robotics, medical devices, aerospace, and automotive industries. With the development of the Internet of Things (IoT), microcontrollers have become even more prevalent in … Read more

Exploiting SATA Cables: How a Security Flaw Turns Hard Drive Cables into Antennas for Data Leakage

Exploiting SATA Cables: How a Security Flaw Turns Hard Drive Cables into Antennas for Data Leakage

The “SATAn” vulnerability turns SATA cables into antennas to defeat air gap security. Mordechai Guri at Ben-Gurion University seems to be in the death zone of air-physically isolated encrypted computers, or at least giving up their secrets. This hacker exploits a computer’s SATA cable as an antenna to leak data, another example of how many … Read more