Information leakage via side channels is a widely recognised threat to cyber security. In particular small devices are known to leak information through physical channels, i.e. power consumption, electromagnetic radiation, and timing behaviour. In other words, the power consumed by mobile phones can reveal information about the data stored on the phone and attackers can steal this data by managing to capture the leakage. This can ultimately lead to complete security breaches in the form of data recovery.
At present, accounting for leakage requires access to a fully equipped testing lab, and skilled people to conduct side channel experiments. This makes it virtually impossible for the general developers of devices to test their implementations against leakage attacks as these labs are only available to high-end developers, such as those producing chip-and-pin cards.
The aim of the research project is to bring the skill of a testing lab to the desk of a developer of standard consumer devices, without the need for domain specific knowledge. To ensure the success of the project the research group have partnered with a leading developer of compiler toolchains, Embecosm.
On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.
Cyberwatching.eu has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740129. The content of this website does not represent the opinion of the European Commission, and the European Commission is not responsible for any use that might be made of such content. Privacy Policy | Disclaimer / Terms and Conditions of Use