透過您的圖書館登入
IP:216.73.216.60

並列摘要


Today's mobile phones have diverse functions and features such as calling, Internet surfing, game playing, banking, storage of personal and professional data. Given that these devices run an increasing amount of added value applications, the number of the software attacks on them has drastically increased. This study shows that the mobile platforms, especially their constituent components running security‐related applications, could also be good targets for hardware attacks where sensitive data stored in the mobile phone are extracted using physical methods. This article discusses the feasibility and presents the results of a technique involving the extraction of secret keys by using the Electromagnetic Analysis (EMA) on software implementations of the Advanced Encryption Standard (AES) running on Java mobile phones. Obtaining these keys can be used for forensic purposes or to recover encrypted data that could have been enciphered using such keys.

延伸閱讀