Washington D.C. workshop on side-channel analysis attacks on embedded devices

Cryptography Research will hold a one-day workshop about how to thwart attacks on embedded devices like mobile communication systems. The workshop is entitled: “An Introduction to Side-Channel Analysis, SPA, DPA and Timing Attacks” and will take place at the Crowne Plaza Washington DC/Silver Spring Hotel on August 14, 2008.

This is the third in a series of embedded system security workshops CRI has run this year. Participants will get up to speed on side-channel attacks, including power analysis attacks such as Simple Power Analysis (SPA), Differential Power Analysis (DPA) and timing analysis. CRI will examine practical design approaches to countering power analysis threats and review the state of associated U.S. and international security evaluation certifications, such as U.S. Federal Information Processing Standard (FIPS) 140-3 and Common Criteria.

Attendees will also have the opportunity to perform hands-on exercises, including simulating a timing attack and using SPA to interpret power traces, as well as recover a simulated PIN. CRI will also demonstrate a live DPA attack using the DPA Workstation.

The prime audiences for the workshop include developers and architects of hardware and software security products, as well as evaluators and technical writers of requirements for tamper resistant products. Technologists designing and testing tamper resistant systems for consumer products, financial systems, anti-piracy/conditional access systems, or government/defense applications are encouraged to attend.

Don't miss