ORSHIN Attack Defense Framework

Secret-dependent operations lead to secret extraction through measuring power consumption

Description

Secret-dependent operations lead to secret extraction through measuring power consumption

CWE

CVE

Attack Surfaces

Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)

Attack Vectors

SCA

Power Side-Channel (MITRE EMB3D TID-101)

Defenses

Constant-time/flow implementation