Master AI and Machine Learning: From Neural Networks to Applications
Become an AI & ML Engineer with Cal Poly EPaCE — IBM-Certified Training
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a groundbreaking method of cryptanalysis that recovers secret keys from non-compromised devices by analyzing video footage of power LEDs. Learn how cryptographic computations affect power consumption, altering LED brightness and color. Discover how attackers can exploit commercial video cameras, including smartphones and security cameras, to capture high-resolution footage of power LEDs. Understand the technique of using a camera's rolling shutter to dramatically increase sampling rates from 60-120 to 60,000 measurements per second. Examine the process of analyzing video frames in RGB space to induce power consumption and recover secret keys. Gain insights into this innovative approach to cryptanalysis presented by Etay Iluz and Ben Nassi at Black Hat, challenging traditional notions of device security.
Syllabus
Video-Based Cryptanalysis: Recovering Cryptographic Keys from Device Using Video of Power LED
Taught by
Black Hat