Results 1 to 10 of about 5,942,634 (324)
Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. [PDF]
The invention of smart low-power devices and ubiquitous Internet connectivity have facilitated the shift of many labour-intensive jobs into the digital domain.
Alahmadi AN +5 more
europepmc +2 more sources
A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis [PDF]
Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature.
Petr Socha +2 more
doaj +2 more sources
Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle microarchitecture state to steal the user’s secret data and even compromise the operating systems.
Congcong Chen, Kenqin Li, Jiliang Zhang
exaly +2 more sources
Side-Channel-Free Quantum Key Distribution [PDF]
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual
Braunstein, Samuel L. +1 more
openaire +5 more sources
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography [PDF]
Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection ...
Xiaoxuan Lou +3 more
semanticscholar +1 more source
Frequency Throttling Side-Channel Attack [PDF]
Modern processors dynamically control their operating frequency to optimize resource utilization, maximize energy savings, and conform to system-defined constraints.
Chen Liu +3 more
semanticscholar +1 more source
Side-Channel Attack Analysis on In-Memory Computing Architectures [PDF]
In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as deep neural networks (DNNs). As DNN models are generally highly proprietary, the neural network architectures become valuable targets for attacks. In IMC
Ziyu Wang +4 more
semanticscholar +1 more source
Wireless Charging Power Side-Channel Attacks [PDF]
This paper demonstrates that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone that charges wirelessly leaks information about its activity to the wireless charger transmitter.
Alexander La Cour, K. Afridi, G. Suh
semanticscholar +1 more source
JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos +3 more
doaj +1 more source
SoK: Deep Learning-based Physical Side-channel Analysis
Side-channel attacks represent a realistic and serious threat to the security of embedded devices for already almost three decades. A variety of attacks and targets they can be applied to have been introduced, and while the area of side-channel attacks ...
S. Picek +4 more
semanticscholar +1 more source

