-
Recent Posts
Recent Comments
注入资源汇总PE注入,DLL注入,代码注… on Fault Injection on Linux: Prac… BertoldVdb on Reversing the Balong M3/MCU Co… Norman on Writeups – LowDeep, Kabo… ByamBa Sumiya on Writeups – LowDeep, Kabo… Pasquale on EM Fault Injection on a Budget… Archives
- November 2020
- September 2020
- August 2020
- June 2020
- May 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- October 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- September 2015
- June 2015
- April 2015
- December 2014
- November 2014
- September 2014
- August 2014
- July 2014
Categories
Meta
Monthly Archives: August 2018
Power Leakage Modelling of DES
This weekend, as part of my efforts to advance my learning of power analysis, I attempted to create my own power leakage model of DES and recover a key without referring to previous work. My targets were the ATMega328p board, … Continue reading →
Magnetic Correlation Analysis of AES
Over the past week, I have attempted to replicate my power analysis work on AES using a magnetic field / H-Field probe. Unfortunately, there is little literature on the specifics of how to do this, but I was able to … Continue reading →
Some thoughts on motivation…
It’s been a while since my last quality shitpost, and it is time I shitposted again. The past year has been a time of growth for me, both in terms of pushing my technical boundaries and in terms of professional … Continue reading →
Differential Power Analysis vs AES
This post is a follow-up to my last post regarding correlation power analysis (CPA). A second technique, differential power analysis (DPA), can also be used to analyze power traces to extract information. The specific attack I will illustrate below is … Continue reading →
Correlation Power Analysis vs AES
Recently, I spent some time learning about power analysis attacks. This has been an interesting journey with many interesting applications. The theory behind this is simple – that different operations (or – crucially – the same operation with different data) … Continue reading →