Descriptif
In this course you will be introduced to embedded security with a designer and attacker points of view. More precisely, you will discover that even if you chose a strong cryptographic algorithm to protect data, some secrets may leak during its computation on a mobile device. To do that, you will learn how to program such devices (e.g. smart cards) and how to intercept secrets by using physical probes. From this knowledge you will design some countermeasures to defeat these hardware attacks (e.g. side-channels).
Diplôme(s) concerné(s)
Parcours de rattachement
Format des notes
Numérique sur 20Littérale/grade réduitPour les étudiants du diplôme M2 Cyber - Cybersecurity
Le rattrapage est autoriséPour les étudiants du diplôme M2 Cyber Physical System
Pour les étudiants du diplôme MScT-Cybersecurity : Threats and Defenses
Le rattrapage est autorisé- Crédits ECTS acquis : 4 ECTS
Pour les étudiants du diplôme Echanges PEI
Le rattrapage est autorisé (Note de rattrapage conservée)- Crédits ECTS acquis : 4 ECTS