Researchers devise algorithm to protect hardware from side-channel attacks

clock
A student working on hardware at UC's Digital Design Environments Laboratory in the University of Cincinnati. Credit: Corrie Stookey/UC College of Engineering and Applied Science
Image:

A student working on hardware at UC's Digital Design Environments Laboratory in the University of Cincinnati. Credit: Corrie Stookey/UC College of Engineering and Applied Science

Algorithm equalises power-draw making side-channel attacks harder to execute

A joint team of researchers have developed an algorithm that, they claim, can safeguard hardware against attacks based on detecting variations in power and electromagnetic radiation - so-called side-channel...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on uncategorised

A decade-long labour shortage is helping to fuel big pay rises for IT professionals

Want to make £££ in IT? Go into quality assurance, security, architecture or programme management

Then work your way up to CIO - but avoid the helpdesk, which (as always) offers the worst-paid roles in IT

clock 13 February 2020 •
IT professionals are generally happy in their roles - they just want more money

Half of IT pros plan to change jobs in 2020 - Harvey Nash

Two-thirds of IT pros are happy in their job, according to Harvey Nash survey, but just want more money

clock 13 February 2020 •

Firewall pioneer Nir Zuk discusses next-generation security

Computing blogs
clock 28 October 2010 •