Algorithm Defends Against Side-Channel Attacks on Hardware
- Magazine Article
Electronic devices that used to rely on passwords now use Touch ID or face-recognition software. But protecting software is only one part of electronic security — hardware is also susceptible to attacks. Devices such as remote car keys, cable boxes, and even credit card chips are all vulnerable to hardware attacks, mostly because of their design. These devices are small and lightweight and typically operate on minimal power. Engineers optimize designs, so the devices can work within these low-power constraints.