Experiments in Attacking FPGA-Based Embedded Systems using Differential Power Analysis
In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer security community. Research into counter-measures for these cryptographic systems has intensified as well. Experiments have been conducted showing the potential effectiveness of power analysis attacks and preventative techniques on both software (e.g. smartcard and DSP) and hardware (e.g. ASIC and FPGA) processing elements. One key observation that motivates the authors' paper is that the majority of the research into power analysis on FPGA-based cryptographic systems has been theoretical in nature, evaluated through simulation, or experimented using custom hardware that does not closely mirror real-world systems.