University of Cambridge > > Microsoft Research Cambridge, public talks > Physical security and side channel attacks in Arm based SoCs

Physical security and side channel attacks in Arm based SoCs

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Microsoft Research Cambridge Talks Admins.

 Please note, this event may be recorded. Microsoft will own the copyright of any recording and reserves the right to distribute it as required.

From SIM cards to Azure Sphere, end devices need securing against physical attacks. Extracting the secrets from these devices can bring rich rewards for the hackers. A technological arms race has developed. This lecture will cover the lengths the hackers have gone to extract secrets and the countermeasures Arm have created.

The talk will cover: 1) What is silicon security? 2) A history of side channel attacks 3) A real life side channel hack explained 4) A live side channel demo, how to extract the AES key from a production SoC in 60 seconds 5) A small section covering Arm’s IP in this area

This talk is part of the Microsoft Research Cambridge, public talks series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.


© 2006-2022, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity