aboutsummaryrefslogtreecommitdiff
path: root/content/SideChannel.md
diff options
context:
space:
mode:
authorRob Austein <sra@hactrn.net>2021-10-08 00:30:08 -0400
committerRob Austein <sra@hactrn.net>2021-10-08 00:30:08 -0400
commit71487660812754e5f26f26595b6c3d456f9f6db8 (patch)
treee960190262edcbb0164edbac1e52915c5a339442 /content/SideChannel.md
parentb11298b250f63daf091591d1638608325f766d9a (diff)
Get rid of conversion stuff, just build content -> website
Diffstat (limited to 'content/SideChannel.md')
-rw-r--r--content/SideChannel.md12
1 files changed, 12 insertions, 0 deletions
diff --git a/content/SideChannel.md b/content/SideChannel.md
new file mode 100644
index 0000000..9fd350e
--- /dev/null
+++ b/content/SideChannel.md
@@ -0,0 +1,12 @@
+Title: SideChannel
+Author: trac
+Date: 2016-12-15 22:44
+
+
+# Side Channel Attacks
+
+Side Channel attacks on hardware are hard to avoid, detect and mitigate. But this should not stop us from trying. The CrypTech platform should be developed with side channel issues in mind. This page tries to collect information about relevant side channel attacks, mitigation strategies, side channel resistant design methods (blinding for example) and detection.
+
+
+* http://eprint.iacr.org/2013/579 "On Measurable Side-Channel Leaks inside ASIC Design Primitives"
+* http://people.umass.edu/gbecker/BeckerChes13.pdf "Stealthy Dopant-Level Hardware Trojans"