Hardware Vulnerability Tool
PublicAll types of devices are potentially vulnerable to physical data leakage. In order to assess device security pre-fabrication, a simulator that can determine a cryptographic system’s vulnerability to side-channel attacks is useful. Researching and understanding differential power analysis (DPA) attacks and side channel vulnerabilities of devices, is of great interest to manufacturers, consumers, and security scholars. The purpose of our project is to create a simulator to detect the vulnerabilities in a user's hardware. Our product uses ModelSim to simulate the operation of the device, then runs a side-channel-based attack on the data from the simulation. Based on the results of this attack, the user can understand their systems vulnerability to side-channel attacks and take appropriate precautions. This way, the developer can make the needed adjustments without the need for manufacturing a physical prototype on which side-channel leakage can be tested.
- This report represents the work of one or more WPI undergraduate students submitted to the faculty as evidence of completion of a degree requirement. WPI routinely publishes these reports on its website without editorial or peer review.
- Creator
- Publisher
- Identifier
- 22201
- E-project-050521-122042
- Keyword
- Advisor
- Year
- 2021
- Date created
- 2021-05-05
- Resource type
- Major
- Rights statement
- License
Relations
- In Collection:
Items
Items
Thumbnail | Title | Visibility | Embargo Release Date | Actions |
---|---|---|---|---|
|
Hardware Vulnerability Tool.pdf | Public | Download |
Permanent link to this page: https://digital.wpi.edu/show/z029p7718