We would like to keep you up to date with the latest news from Digitalisation World by sending you push notifications.
Subscribe to Digitalisation World
Why Subscribe?
Digital Newsletter Each week our editor Phil Alsop rounds up the most popular articles, videos and expert opinions. We compile this into a Digital Newsletter and send it straight to your inbox every week.
Digital Magazines We'll let you know each time a new edition of Digitalisation World is released so that you're always kept up-to-date with the latest and greatest news and press releases.
Video Magazines The Digitalisation World Video magazine contains the latest Zoom interviews with experts in the industry.
How leaky is your device?
A
new generation of digital devices that will protect consumers from
cyber-attacks could be a step closer thanks to a grant of over ?1
million
from the Engineering
and Physical Sciences Research Council (EPSRC) awarded to the
University of Bristol for a research project to protect consumers’
sensitive data.
9 years ago
Posted in
Digital devices, such as smart banking cards or smart phones, are widely used to store private and sensitive data about peoples’ digital lives. However, securing these devices is a major task for the computing industry. The research project by the University’s Cryptography Research Group hopes to address the issue of leakage-related attacks. Information leakage via side channels is a widely recognised threat to cyber security. In particular small devices are known to leak information through physical channels, i.e. power consumption, electromagnetic radiation, and timing behaviour. In other words, the power consumed by mobile phones can reveal information about the data stored on the phone and attackers can steal this data by managing to capture the leakage. This can ultimately lead to complete security breaches in the form of data recovery. At present, accounting for leakage requires access to a fully equipped testing lab, and skilled people to conduct side channel experiments. This makes it virtually impossible for the general developers of devices to test their implementations against leakage attacks as these labs are only available to high-end developers, such as those producing chip-and-pin cards. The aim of the research project is to bring the skill of a testing lab to the desk of a developer of standard consumer devices, without the need for domain specific knowledge. To ensure the success of the project the research group have partnered with a leading developer of compiler toolchains, Embecosm. Dr Elisabeth Oswald, Reader in Applied Cryptography in the Cryptography Research Group and who is leading the project, said: “Our previous research has shown that in the case of small embedded devices, the nature of the leakages can be appropriately modelled using statistical tools. “This project's research hypothesis is that one can make meaningful statements about the leakage behaviour of new implementations on such small devices by utilising a priori derived models.” The researchers hope the project will lead to a new generation of devices that will provide consumers with high-end security in low-end devices, and also protect consumers’ sensitive information. As the world gets even more digital, and attackers become more sophisticated, this is another important step on the arms race between the good guys and the bad guys.