A Survey of Power and Electromagnetic-Based Side-Channel Attack Countermeasures

Authors

  • Robert Kramer Author
  • Mark Reith
  • Wayne Henry
  • Anthony Rose

DOI:

https://doi.org/10.34190/eccws.24.1.3627

Keywords:

Side-Channel Attack, Power Analysis, Electromagnetic Analysis, Cryptography, Countermeasures

Abstract

Cryptography is a cornerstone of modern computing security, but it remains vulnerable to Side-Channel Attacks (SCAs), which exploit hardware implementations to compromise encryption. SCAs pose significant cybersecurity risks by extracting sensitive information, such as encryption keys, through passive observation of side-channel leakage or active manipulation of system operations. This paper reviews non-invasive power and EM-based SCAs, evaluates the effectiveness and limitations of existing countermeasures, and identifies gaps that warrant further research. The analysis aims to guide the development of robust defenses and inform future efforts to secure cryptographic systems against evolving threats.

Author Biographies

Robert Kramer, Author

Robert Kramer is a graduate student pursuing an M.S. in Computer Engineering at the Air Force Institute of Technology, Wright-Patterson AFB, Ohio USA. He received a B.S. in Computer Engineering from Embry-Riddle Aeronautical University in 2021. His research interests include side-channel analysis and multilingual malware.

Mark Reith

Mark Reith received his Ph.D. in Computer Science from the University of Texas at San Antonio in 2009. He is currently an assistant professor of computer science at the Air Force Institute of Technology. His research interests include cyber warfare theory, Agile software engineering & modeling, and game-based learning.

Wayne Henry

Wayne C. Henry is an Assistant Professor of Electrical Engineering at the Air Force Institute of Technology, Wright-Patterson AFB, Ohio USA. He received a PhD in Electrical Engineering in 2020 from AFIT. His research interests include space system cyber security, malware analysis, offensive security, human-machine interaction, and information visualizations.

Anthony Rose

Anthony J. Rose is a Doctoral Candidate of Electrical Engineering at the Air Force Institute of Technology (AFIT), Wright-Patterson AFB, Ohio USA. He received a B.S. in Electrical Engineering from Arizona State University and M.S. in Electrical Engineering from AFIT. His research interests include malware analysis, cybersecurity, and machine learning.

Downloads

Published

2025-06-25