Function mapping from photo-emission
Description
Function mapping from photo-emissionCWE
CVE
Attack Surfaces
Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)
Attack Vectors
Reverse Engineering
SEM (MITRE EMB3D TID-102)
Defenses
Photo-emission spots should not leak the position of functions inside the IC, Duplicate emission sources at various location of the digital circuitry