Side-Channel Attacks (SCA) extract cryptographic keys from hardware systems by analyzing power traces or electromagnetic emission data from the target device along with the corresponding collection of plain and/or cipher data. The traditional approach of dealing with SCA by measuring device parameters after manufacturing is expensive and time-consuming.
Fault Injection Attacks (FIA) extract secrets, e.g. cryptographic keys, from hardware systems by injecting faults, e.g. using a laser beam to disrupt the circuit function, or increasing operating frequency or supply voltage beyond their maximum specifications.
12 Damonmill Square, Suite EB-1N, Concord, MA 01742 USA
300 Washington Street, Suite 850, Newton, MA 02458 USA
© 2023 FortifyIQ, Inc.