ORSHIN Attack Defense Framework

Function mapping from EM

Description

Function mapping from EM

CWE

CVE

Attack Surfaces

Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)

Attack Vectors

Electromagnetic Side-Channel (MITRE EMB3D TID-102)

Reverse Engineering

Defenses

EM radiation should not leak the position of functions inside the IC, Use dummy logic that will activate various EM spots across the digital circuitry