>
back to curriculum
chapter 24Measurement and Hardware Security60 min read18 sections

Electronic Measurements and Instrumentation

"You can't fix what you can't measure, and you can't attack what you can't observe." Every concept we have built up over the previous chapters becomes tactile inside lab equipment. Voltmeters turn the abstract idea of potential difference into a number. Oscilloscopes turn time-varying voltages into a picture you can argue with. Spectrum analyzers turn a noisy radio band into a landscape of peaks and valleys. And in hardware security, these same instruments become the lockpicks: a low-noise oscilloscope on a sense resistor will give you the AES key out of a smart card, given enough patience.

This chapter is the practical companion to everything else in the curriculum. It is also the bridge to Chapter 24 on hardware security, where these same instruments will be pointed at chips not to debug them but to extract their secrets. The same Tektronix scope that an EE undergrad uses to debug a microcontroller is, with different software on the host, exactly what a side-channel researcher uses to break a cryptographic module. The instrument is neutral. What changes is the question you ask of the data.

We will move from the foundational vocabulary (accuracy, precision, errors, statistics) through the basic meters (DC and AC voltmeters, ammeters, ohmmeters, multimeters), into signal generation, then through analyzers (wave, distortion, spectrum), into oscilloscopes in considerable depth (because they are the dominant instrument), then bridges and Q-meters, transducers, data acquisition, and digital instruments. At each step we will keep one eye on the security implications.


sections