Sommaire

  • Cet exposé a été présenté le 20 décembre 2024 (10:00 - 11:00).

Description

  • Orateur

    François Sarrazin, Pierre Granier - University of Rennes, IETR (UMR 6164)

Electromagnetic leakage eavesdropping is an increasingly accessible attack vector due to the democratization of software-defined radio. "TEMPEST" attacks rely on passively listening to the unwanted electromagnetic emanations of a target (computer screen, low speed USB peripheral…) in order to retrieve the transmitted data. However, the range and properties of such leakages are unpredictable. Therefore, hardware implants have been designed to covertly extract data in a more controlled and covert manner compared to opportunistic leakage, in return for a more invasive attack. In this talk, we will focus on recent progress regarding the development of hardware Trojans based on backscattering methods to remotely extract data. In particular, the case of multi-Trojans allowing the taping of different sources will be presented.

Infos pratiques

Prochains exposés

  • ML-Based Hardware Trojan Detection in AI Accelerators via Power Side-Channel Analysis

    • 16 janvier 2026 (11:00 - 12:00)

    • Inria Center of the University of Rennes - Espace de conférences

    Orateur : Yehya NASSER - IMT Atlantique

    Our work discusses the security risks associated with outsourcing AI accelerator design due to the threat of hardware Trojans (HTs), a problem traditional testing methods fail to address. We introduce a novel solution based on Power Side-Channel Analysis (PSCA), where we collect and preprocess power traces by segmenting them and extracting features from both time and frequency domains. This[…]
    • SemSecuElec

    • Side-channel

    • Machine learning

    • Hardware trojan

Voir les exposés passés