Student Work

Hardware Vulnerability Tool

Public

Downloadable Content

open in viewer

All types of devices are potentially vulnerable to physical data leakage. In order to assess device security pre-fabrication, a simulator that can determine a cryptographic system’s vulnerability to side-channel attacks is useful. Researching and understanding differential power analysis (DPA) attacks and side channel vulnerabilities of devices, is of great interest to manufacturers, consumers, and security scholars. The purpose of our project is to create a simulator to detect the vulnerabilities in a user's hardware. Our product uses ModelSim to simulate the operation of the device, then runs a side-channel-based attack on the data from the simulation. Based on the results of this attack, the user can understand their systems vulnerability to side-channel attacks and take appropriate precautions. This way, the developer can make the needed adjustments without the need for manufacturing a physical prototype on which side-channel leakage can be tested.

  • This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
Creator
Publisher
Identifier
  • 22216
  • E-project-050521-122926
Keyword
Advisor
Year
  • 2021
Date created
  • 2021-05-05
Resource type
Major
Rights statement

Relations

In Collection:

Items

Items

Permanent link to this page: https://digital.wpi.edu/show/c534fr699