Results 11 to 20 of about 5,942,634 (324)
SoK: Design Tools for Side-Channel-Aware Implementations [PDF]
Side-channel attacks that leak sensitive information through a computing device's interaction with its physical environment have proven to be a severe threat to devices' security, particularly when adversaries have unfettered physical access to the ...
I. Buhan +3 more
semanticscholar +1 more source
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great attention from side-channel analysis researchers in recent years.
Zhuang Xu +5 more
semanticscholar +1 more source
Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis
One of the main promoted advantages of deep learning in profiling sidechannel analysis is the possibility of skipping the feature engineering process.
Guilherme Perin, Lichao Wu, S. Picek
semanticscholar +1 more source
A Hierarchical Approach for Multiple Periodicity Detection in Software Code Analysis
This paper introduces an end-to-end processing method for multiple periodicity signal detection and analysis with particular application in software analysis using analog side channels.
Mine Kerpicci +2 more
doaj +1 more source
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
Deep learning represents a powerful set of techniques for profiling sidechannel analysis. The results in the last few years show that neural network architectures like multilayer perceptron and convolutional neural networks give strong attack performance
Jorai Rijsdijk +3 more
semanticscholar +1 more source
CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events
Cache side channel attacks, as a type of cryptanalysis, seriously threaten the security of the cryptosystem. These attacks continuously monitor the memory addresses associated with the victim’s secret information, which cause frequent memory access on ...
Hui Yan, Chaoyuan Cui
doaj +1 more source
The Limits of SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks
Artificial intelligence (AI) is progressing rapidly, and in this trend, edge AI has been researched intensively. However, much less work has been performed around the security of edge AI.
Go Takatoi +4 more
doaj +1 more source
A Side-Channel-Resistant Implementation of SABER
The candidates for the NIST Post-Quantum Cryptography standardization have undergone extensive studies on efficiency and theoretical security, but research on their side-channel security is largely lacking.
Michiel Van Beirendonck +4 more
semanticscholar +1 more source
Side-Channel Expectation-Maximization Attacks
Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used.
Julien Béguinot +3 more
doaj +3 more sources
Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study
Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most novel and thought-provoking attacks to exfiltrate information from computing hardware.
Arsalan Javeed +2 more
doaj +1 more source

