This course aims to teach learners how to simulate side channel leakage in cryptographic implementations. The course covers using common hardware design tools for pre-silicon power simulations to detect leaky implementations. The teaching method includes a case study demonstrating how simulation can pinpoint individual leaky elements in software and hardware. The intended audience for this course includes security experts, hardware designers, and individuals interested in cryptography and cybersecurity.
Overview
Syllabus
Introduction
The problem
The ingredients
The research
Countermeasure testing
SOC simulation
Future work
Conclusions
Taught by
Black Hat