Results 21 to 30 of about 5,942,634 (324)
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation ...
Clay Carper +4 more
doaj +1 more source
A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks
Computer and network security is an ever important field of study as information processed by these systems is of ever increasing value. The state of research on direct attacks, such as exploiting memory safety or shell input errors is well established ...
Michael Lescisin, Qusay H. Mahmoud
doaj +1 more source
Analisis Ikonologi Iklan Billboard Go-Pay di Yogyakarta
Penelitian ini berjuan untuk mengetahui bagaimana analisis Ikonologi iklan billboard Go-Pay di Yogyakarta. Dalam penelitian ini penulis memakai metode penelitian Deskriptif Kualitatif.
Dinda Destiana Fahma Ayu
doaj +1 more source
Side channel attacks for architecture extraction of neural networks
Side channel attacks (SCAs) on neural networks (NNs) are particularly efficient for retrieving secret information from NNs. We differentiate multiple types of threat scenarios regarding what kind of information is available before the attack and its ...
H. Chabanne +3 more
semanticscholar +1 more source
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
After years of development, FPGAs are finally making an appearance on multi-tenant cloud servers. Heterogeneous FPGA-CPU microarchitectures require reassessment of common assumptions about isolation and security boundaries, as they introduce new attack ...
Zane Weissman +5 more
doaj +1 more source
Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices
Microcontrollers and SoC devices have widely been used in Internet of Things applications. This also brings the question whether they lead to new security threats unseen in traditional computing systems. In fact, almost all modern SoC chips, particularly
Dennis R. E. Gnad +2 more
doaj +1 more source
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards [PDF]
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and
Hartog, J.I. den, Vink, E.P. de
core +7 more sources
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Muhammad Yasin +2 more
+6 more sources
Non-specific TVLA method based on two-sample KS test
Test vector leakage assessment (TVLA) is prone to “false negative” when the power consumption sample size is small.To address this issue, it was found that for non-specific TVLA, when the power consumption sample size changes, the test statistic t-values
Zhen ZHENG +3 more
doaj
As portable devices become more ubiquitous, data security in these devices is becoming increasingly important. Traditional circuit design techniques leave otherwise secure systems vulnerable due to the characteristics of the hardware implementation ...
Michael Linder, Jia Di, Scott C. Smith
doaj +1 more source

