Results 11 to 20 of about 5,942,634 (324)

SoK: Design Tools for Side-Channel-Aware Implementations [PDF]

open access: yesIACR Cryptology ePrint Archive, 2021
Side-channel attacks that leak sensitive information through a computing device's interaction with its physical environment have proven to be a severe threat to devices' security, particularly when adversaries have unfettered physical access to the ...
I. Buhan   +3 more
semanticscholar   +1 more source

Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber

open access: yesIEEE transactions on computers, 2022
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great attention from side-channel analysis researchers in recent years.
Zhuang Xu   +5 more
semanticscholar   +1 more source

Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2022
One of the main promoted advantages of deep learning in profiling sidechannel analysis is the possibility of skipping the feature engineering process.
Guilherme Perin, Lichao Wu, S. Picek
semanticscholar   +1 more source

A Hierarchical Approach for Multiple Periodicity Detection in Software Code Analysis

open access: yesIEEE Access, 2022
This paper introduces an end-to-end processing method for multiple periodicity signal detection and analysis with particular application in software analysis using analog side channels.
Mine Kerpicci   +2 more
doaj   +1 more source

Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2021
Deep learning represents a powerful set of techniques for profiling sidechannel analysis. The results in the last few years show that neural network architectures like multilayer perceptron and convolutional neural networks give strong attack performance
Jorai Rijsdijk   +3 more
semanticscholar   +1 more source

CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events

open access: yesFuture Internet, 2022
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim’s secret information, which cause frequent memory access on ...
Hui Yan, Chaoyuan Cui
doaj   +1 more source

The Limits of SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks

open access: yesApplied Sciences, 2022
Artificial intelligence (AI) is progressing rapidly, and in this trend, edge AI has been researched intensively. However, much less work has been performed around the security of edge AI.
Go Takatoi   +4 more
doaj   +1 more source

A Side-Channel-Resistant Implementation of SABER

open access: yesIACR Cryptology ePrint Archive, 2021
The candidates for the NIST Post-Quantum Cryptography standardization have undergone extensive studies on efficiency and theoretical security, but research on their side-channel security is largely lacking.
Michiel Van Beirendonck   +4 more
semanticscholar   +1 more source

Side-Channel Expectation-Maximization Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used.
Julien Béguinot   +3 more
doaj   +3 more sources

Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study

open access: yesIEEE Access, 2023
Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most novel and thought-provoking attacks to exfiltrate information from computing hardware.
Arsalan Javeed   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy