> From: John Anderjaska [mailto:john.anderja...@dsainc.com]
> Sent: Thursday, August 28, 2014 1:24 PM
> 
> In summary I'd say it is a glaring hole in most contemporary
> security solutions.

But the type of information that could be introduced to that medium is what?  
Take it as given, that certain CPU instructions are prone to consume more power 
than other instructions, just because they activate larger areas of the chip, 
with a larger number of bit flips and gate propagations occurring internally, 
so yes, the power consumed "fluctuates according to the computation that is 
being performed by its processor," but does not reveal specifics of the data 
that is being processed.

This is like watching the power consumption of a house painter painting a house 
with his spray gun, and based on the power fluctuations, determining what color 
paint he has loaded in the spray gun.  Yes you can probably tell when he's 
painting, but no you can't determine *what* he's painting.

Yes I believe an observer of the ground signal could determine "I saw a power 
spike between X ms and Y ms, which probably means you did something 
cryptographic or doing some kind of compression or decompression, or graphics 
rendering," but no I don't believe even remotely, that they are extracting 
private keys out of that signal, nor what jpg you viewed, nor what file you 
zip'd up, or what video you converted from H.264 to Mpeg4.  All of these would 
be the *content* of what you were processing at the time.

Reply via email to