3. Physical attacks
Embedded systems are based on a more or less complex hardware layer, which exposes them to numerous so-called "physical" attacks. These are many and varied, and their feasibility depends mainly on the means (hardware equipment, number of available test vectors, physical access), knowledge (access to detailed technical documentation, access to data, experience) and time available to the attacker. After presenting the taxonomy of physical attacks, this section presents the main physical attacks, from the most difficult to the most easily achieved.
3.1 Taxonomy of physical attacks
There are numerous so-called "physical" attacks targeting embedded electronic systems. These can be divided into two distinct groups: active and passive attacks. Active attacks, as their...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Physical attacks
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!