Results 271 to 280 of about 5,942,634 (324)
Some of the next articles are maybe not open access.

Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel

Dependable Systems and Networks, 2020
Machine learning has been attracting strong interests in recent years. Numerous companies have invested great efforts and resources to develop customized deep-learning models, which are their key intellectual properties.
Junyin Wei   +4 more
semanticscholar   +1 more source

Side-Channel Attack Pitfalls

2007 44th ACM/IEEE Design Automation Conference, 2007
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire   +1 more source

SIDE CHANNEL PUMP

2000
The invention relates to a delivery pump (2) which is configured as a side channel pump, comprising a driven impeller (4) which rotates in a housing (3). A liquid to be delivered is conveyed to guide blades (6) in the impeller (4) from the radial inner area.
MANNESMANN VDO AG, WILHELM HANS DIETER
openaire   +2 more sources

Side-Channel Distinguishers

2021
A distinguisher is a statistical tool whose purpose is to determine the most probable key among a set of keys. Several distinguishers are introduced in the literature. Hereafter, we present the most used ones.
Maamar Ouladj, Sylvain Guilley
openaire   +1 more source

Far Field EM Side-Channel Attack on AES Using Deep Learning

IACR Cryptology ePrint Archive, 2020
We present the first deep learning-based side-channel attack on AES-128 using far field electromagnetic emissions as a side channel. Our neural networks are trained on traces captured from five different Bluetooth devices at five different distances to ...
Ruize Wang, Huanyu Wang, E. Dubrova
semanticscholar   +1 more source

BranchScope: A New Side-Channel Attack on Directional Branch Predictor

International Conference on Architectural Support for Programming Languages and Operating Systems, 2018
We present BranchScope - a new side-channel attack where the attacker infers the direction of an arbitrary conditional branch instruction in a victim program by manipulating the shared directional branch predictor. The directional component of the branch
Dmitry Evtyushkin   +3 more
semanticscholar   +1 more source

Side Channel Attack

2018
Embedded frameworks remain continuously adopted in a varied range of application places. Cryptography is the design besides analysis of calculated structures that enable communications for security issue in the presence of malicious adversaries. Side channel attacks are a current class of attacks that remains very powerful in practice.
EFE, Ahmet, ALASHİK, Khalid Mohammed
openaire   +1 more source

Cache Side Channels

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Cache side channels are a type of attack vectors through which an adversary infers secret information of a running program by observing its use of CPU caches or other caching hardware. The study of cache side channels, particularly access-driven cache side channels, is gaining traction among security researchers in recent years.
openaire   +1 more source

Side channel vulnerability metrics

Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013
Side-channels enable attackers to break a cipher by exploiting observable information from the cipher program's execution to infer its secret key. While some defenses have been proposed to protect information leakage due to certain side channels, the effectiveness of these defenses have mostly been given only qualitative analysis by their authors.
Tianwei Zhang   +3 more
openaire   +1 more source

Electromagnetic side-channel attacks

Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018
Digital forensics is fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are often hampered by the data contained on these devices being encrypted.
Asanka Sayakkara   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy