Related Concepts
Definition
In a temperature attack, a malicious process leaks information by modulating the device’s temperature. Temperature increase is typically caused by launching intensive computations. Heat differences can be sensed by a variety of means such as the monitoring of fan-speed variations, the reading of disk SMART (Self-Monitoring Analysis & Reporting Technology) attribute 194, catching interrupts caused by Pentium overheat hardware flag set (IA32_THERM_STATUS), or the monitoring of memory faults due to overheating.
The throughput of such covert channels is very low but the leakage of a cryptographic key (a few hundred bits) may suffice to compromise an improperly protected system.
Experimental Results
This attack was implemented on PCs, Smart Cards, Processes, and FPGAs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Brouchier J, Kean T, Marsh C, Naccache D (Mar–Apr 2009) Temperature attacks. IEEE Security and Privacy 7(2):79–82
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Naccache, D. (2011). Temperature Attack. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_519
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_519
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering