Ringvorlesung Systemsicherheit at TU München

Flashcards and summaries for Ringvorlesung Systemsicherheit at the TU München

Arrow Arrow

It’s completely free

studysmarter schule studium
d

4.5 /5

studysmarter schule studium
d

4.8 /5

studysmarter schule studium
d

4.5 /5

studysmarter schule studium
d

4.8 /5

Study with flashcards and summaries for the course Ringvorlesung Systemsicherheit at the TU München

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

What hardware attacks are possible in modern systems?

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

What does modern cryptography provide?

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

What can only be attacked with SPA?

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

How does DPA work step by step?

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

What categories can be used to describe implementation attacks? Examples?

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

Name an example for a hardware attack on embedded systems!

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

What is a Cloak&Dagger attack?

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

What is a repackaging attack?

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

Name 3 attacks possible on mobile apps!

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

How does static analysis provide app security?

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

Whats the advantage when using EM-based side channel analysis?

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

How does dynamic analysis work?

Your peers in the course Ringvorlesung Systemsicherheit at the TU München create and share summaries, flashcards, study plans and other learning materials with the intelligent StudySmarter learning app.

Get started now!

Flashcard Flashcard

Exemplary flashcards for Ringvorlesung Systemsicherheit at the TU München on StudySmarter:

Ringvorlesung Systemsicherheit

What hardware attacks are possible in modern systems?
Side-channel analysis, Fault attack, Reverse Engineering, Probing

Ringvorlesung Systemsicherheit

What does modern cryptography provide?
Confidentiality, Authentication, Integrity, Non-Repudiation, Anonymity

Ringvorlesung Systemsicherheit

What can only be attacked with SPA?
Eliptic Curve Cryptography, since most protocols use the key only once, so we must target the single execution

Ringvorlesung Systemsicherheit

How does DPA work step by step?
Take a lot of measurements
Make statistical analysis with hypothesis testing
Find intermediate values that depend on unknown key + known input
–> Compare hypothetical key values and find correct one

Ringvorlesung Systemsicherheit

What categories can be used to describe implementation attacks? Examples?
Active/Non-Active – Fault Attack / Side channel Analysis
Invasive/Semi-Invasive/Non-Invasive – Probing, Optical Fault Attack, Time Measurements
Global / Local – Power Glitching, 1 bit flip

Ringvorlesung Systemsicherheit

Name an example for a hardware attack on embedded systems!
Clockglitching to get access to an automotive ECU lock, by glitching the JTAG communication

Ringvorlesung Systemsicherheit

What is a Cloak&Dagger attack?
App applies Malicious Layer to trick user into clicking things

Ringvorlesung Systemsicherheit

What is a repackaging attack?
Modification of app bytecode, user can’t tell apart fake or legitimate application

Ringvorlesung Systemsicherheit

Name 3 attacks possible on mobile apps!
Cloak & Dagger, App repackaging, Privilege Escalation and Collusion Attacks, Unsecure Data storage, Remote Code execution

Ringvorlesung Systemsicherheit

How does static analysis provide app security?
It detects capability leaks by checking the binary of the app code

Ringvorlesung Systemsicherheit

Whats the advantage when using EM-based side channel analysis?
High resolution in location and time possible, but picks up noise as well

Ringvorlesung Systemsicherheit

How does dynamic analysis work?
Use a single execution trace and then make educated decision on whether its vulnerable
Disadvantage: false negatives, malware could detect the emulator and react

Sign up for free to see all flashcards and summaries for Ringvorlesung Systemsicherheit at the TU München

Singup Image Singup Image
Wave

Other courses from your degree program

For your degree program Elektro- und Informationstechnik, Maschinenbau at the TU München there are already many courses on StudySmarter, waiting for you to join them. Get access to flashcards, summaries, and much more.

Back to TU München overview page

System on Chip Technologies

System Design For The Internet Of Things

Low-Power System Design

What is StudySmarter?

What is StudySmarter?

StudySmarter is an intelligent learning tool for students. With StudySmarter you can easily and efficiently create flashcards, summaries, mind maps, study plans and more. Create your own flashcards e.g. for Ringvorlesung Systemsicherheit at the TU München or access thousands of learning materials created by your fellow students. Whether at your own university or at other universities. Hundreds of thousands of students use StudySmarter to efficiently prepare for their exams. Available on the Web, Android & iOS. It’s completely free.

Awards

Best EdTech Startup in Europe

Awards
Awards

EUROPEAN YOUTH AWARD IN SMART LEARNING

Awards
Awards

BEST EDTECH STARTUP IN GERMANY

Awards
Awards

Best EdTech Startup in Europe

Awards
Awards

EUROPEAN YOUTH AWARD IN SMART LEARNING

Awards
Awards

BEST EDTECH STARTUP IN GERMANY

Awards

How it works

Top-Image

Get a learning plan

Prepare for all of your exams in time. StudySmarter creates your individual learning plan, tailored to your study type and preferences.

Top-Image

Create flashcards

Create flashcards within seconds with the help of efficient screenshot and marking features. Maximize your comprehension with our intelligent StudySmarter Trainer.

Top-Image

Create summaries

Highlight the most important passages in your learning materials and StudySmarter will create a summary for you. No additional effort required.

Top-Image

Study alone or in a group

StudySmarter automatically finds you a study group. Share flashcards and summaries with your fellow students and get answers to your questions.

Top-Image

Statistics and feedback

Always keep track of your study progress. StudySmarter shows you exactly what you have achieved and what you need to review to achieve your dream grades.

1

Learning Plan

2

Flashcards

3

Summaries

4

Teamwork

5

Feedback