Results 21 to 30 of about 5,942,634 (324)

Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis

open access: yesJournal of Cybersecurity and Privacy, 2023
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation ...
Clay Carper   +4 more
doaj   +1 more source

A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks

open access: yesIEEE Open Journal of the Computer Society, 2021
Computer and network security is an ever important field of study as information processed by these systems is of ever increasing value. The state of research on direct attacks, such as exploiting memory safety or shell input errors is well established ...
Michael Lescisin, Qusay H. Mahmoud
doaj   +1 more source

Analisis Ikonologi Iklan Billboard Go-Pay di Yogyakarta

open access: yesAl-Misbah: Jurnal Islamic Studies, 2018
Penelitian ini berjuan untuk mengetahui bagaimana analisis Ikonologi iklan billboard Go-Pay di Yogyakarta. Dalam penelitian ini penulis memakai metode penelitian Deskriptif Kualitatif.
Dinda Destiana Fahma Ayu
doaj   +1 more source

Side channel attacks for architecture extraction of neural networks

open access: yesCAAI Transactions on Intelligence Technology, 2021
Side channel attacks (SCAs) on neural networks (NNs) are particularly efficient for retrieving secret information from NNs. We differentiate multiple types of threat scenarios regarding what kind of information is available before the attack and its ...
H. Chabanne   +3 more
semanticscholar   +1 more source

JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
After years of development, FPGAs are finally making an appearance on multi-tenant cloud servers. Heterogeneous FPGA-CPU microarchitectures require reassessment of common assumptions about isolation and security boundaries, as they introduce new attack ...
Zane Weissman   +5 more
doaj   +1 more source

Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Microcontrollers and SoC devices have widely been used in Internet of Things applications. This also brings the question whether they lead to new security threats unseen in traditional computing systems. In fact, almost all modern SoC chips, particularly
Dennis R. E. Gnad   +2 more
doaj   +1 more source

Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards [PDF]

open access: yes, 2004
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and
Hartog, J.I. den, Vink, E.P. de
core   +7 more sources

Side-Channel Attacks [PDF]

open access: yes, 2019
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Muhammad Yasin   +2 more
  +6 more sources

Non-specific TVLA method based on two-sample KS test

open access: yesTongxin xuebao, 2023
Test vector leakage assessment (TVLA) is prone to “false negative” when the power consumption sample size is small.To address this issue, it was found that for non-specific TVLA, when the power consumption sample size changes, the test statistic t-values
Zhen ZHENG   +3 more
doaj  

Multi-Threshold Dual-Spacer Dual-Rail Delay-Insensitive Logic (MTD3L): A Low Overhead Secure IC Design Methodology

open access: yesJournal of Low Power Electronics and Applications, 2013
As portable devices become more ubiquitous, data security in these devices is becoming increasingly important. Traditional circuit design techniques leave otherwise secure systems vulnerable due to the characteristics of the hardware implementation ...
Michael Linder, Jia Di, Scott C. Smith
doaj   +1 more source

Home - About - Disclaimer - Privacy