cryptography and copy protection

Dpa comb 52 rennes presentation the continuous case

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: comb 52 Rennes presentation The continuous case 53 Rennes presentation TIKHONOV solutions (for several λ) 54 Rennes presentation TIKHONOV solutions (with optimised λ !) 55 Rennes presentation Iterative LSQR (various iteration attempts) 56 Rennes presentation OTHER ATTACKS: FIB s FIB: focused ion beam x Uses gallium ions to mill and form images x Operates like a SEM x Imaging to 5nm resolution s Possible attacks x Deposit probe pads x Defeat blown fuse links x Connect tracks x Cut tracks 57 Rennes presentation CHIP MODIFICATION: CUT... 260 Stage current (pA) 240 220 200 180 160 140 120 -0.1 0.0 0.1 0.2 0.3 0.4 Depth (microns) 58 Rennes presentation 0.5 0.6 0.7 CHIP MODIFICATION: CONNECT... 59 Rennes presentation ADVANCED FIB ATTACKS 60 Rennes presentation JAVA ATTACKS Applets local code Verification local codel Applet type 2 Applet type 1 Applet type s Sandbox Domain 2 Domain 1 JVM system resources 61 Security policy Rennes presentation Conclusion s For any information/pointers on card security and card attacks: x david.naccache@gemplus.com 62 Rennes presentation...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online