Physical attacks
Embedded systems security
Article REF: H8280 V2
Physical attacks
Embedded systems security

Author : Lilian BOSSUET

Publication date: October 10, 2024 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

3. Physical attacks

Embedded systems are based on a more or less complex hardware layer, which exposes them to numerous so-called "physical" attacks. These are numerous and varied, and their feasibility depends mainly on the means (hardware equipment, number of available test vectors, physical access), knowledge (access to detailed technical documentation, access to data, experience) and time available to the attacker. After presenting the taxonomy of physical attacks, this section presents the main physical attacks, from the most difficult to the most easily achieved.

3.1 Taxonomy of physical attacks

There are numerous so-called "physical" attacks targeting embedded electronic systems. We can classify them into two distinct groups: active and passive attacks. Active attacks,...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Software technologies and System architectures"

( 227 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details