Sensitive data extraction
Description
Sensitive data extractionCWE
CVE
Attack Surfaces
Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)
Attack Vectors
Side-Channel Leakage (MITRE EMB3D TID-330)
Electromagnetic Side-Channel (MITRE EMB3D TID-102)
Power Analysis (MITRE EMB3D TID-101)
Defenses
Noise introduction, Dummy instruction insertion, Random instruction hints
Power balancing, Power consumption estimation
Constant-time implementation, Data independent timing
Reduction of profiling infrastructure, Reduced performance counter in non-machine mode