Minimizing The Hardware Can Betray Us!

An algorithm that safeguards the hardware from attacks to steal data has been found by some researchers. Hackers typically use the variation of power and electromagnetic radiation in hardware of electronic devices to steal encrypted information.

 

The work of the Researchers was recently published in the Institute of Engineering and Technology Journal with the University of Wyoming and the University of Cincinnati.

 

Nowadays, electronic devices are now appearing more secure than ever before. TouchID and FaceID have replaced that security were the devices that used to rely on passwords. With high-tech security measures guarding the entry, unlocking our phones is like entering a 21st century Batcave.

 

But the researches say that hardware is also susceptible to attacks. Protecting software is only one part of electronic security.

 

 

Mike Borowczak, an assistant professor at the University of Wyoming said that people believe that they can secure everything by writing more secure passwords. He further added that if the hardware leaks information, all the security mechanisms are futile.

 

The hardware which is vulnerable to hardware attacks is remote car keys, cable boxes, and even credit card chips. This is due to their design, as they are small and lightweight and operate on minimal power. Engineers optimize designs so the devices can work within these low-power constraints.

 

Mike believes that the problem is with the minimization. We are taking a hit on security by optimizing for speed, power, area, cost, etc. We are selectively minimizing the hardware, disregarding the security issues.

 

Tags:,