Raúl Jiménez Naharro , Fernando Gómez Bravo , Juan Antonio Gómez Galán , Manuel Sánchez Raya, Juan José Mata de Acuña
Hardware attack is becoming an important scenario in the system design. Pupils who study design ofelectronic and computer systems must know this scenario and possible solutions against this kind of attacks. Thiswork is a set of exercises to know some vulnerabilities in electronic and computer systems depending on thebehavior implementation. Two cases of studies will be considered: timing attack and differential fault analysis(DFA). The study of each attack will be divided into three stages: the use of the vulnerability as attack; the studyof the vulnerability; and the elimination or reduction of it.
© 2008-2024 Fundación Dialnet · Todos los derechos reservados