Function mapping from EM
Description
Function mapping from EMCWE
CVE
Attack Surfaces
Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)
Attack Vectors
Electromagnetic Side-Channel (MITRE EMB3D TID-102)
Reverse Engineering
Defenses
EM radiation should not leak the position of functions inside the IC, Use dummy logic that will activate various EM spots across the digital circuitry