Results 41 to 50 of about 5,942,634 (324)
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz +4 more
doaj +1 more source
Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika +18 more
core +2 more sources
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
In the profiled side-channel analysis, deep learning-based techniques proved to be very successful even when attacking targets protected with countermeasures. Still, there is no guarantee that deep learning attacks will always succeed.
Lichao Wu, S. Picek
semanticscholar +1 more source
A Novel Side-Channel in Real-Time Schedulers
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority real-time systems (RTS); examples of such systems can be found in automotive systems, avionic systems, power plants and industrial control systems among others ...
Bobba, Rakesh B. +4 more
core +1 more source
Breaking a quantum key distribution system through a timing side channel [PDF]
The security of quantum key distribution relies on the validity of quantum mechanics as a description of nature and on the non-existence of leaky degrees of freedom in the practical implementations.
Kurtsiefer, Christian +1 more
core +1 more source
Domain-Agnostic Representation of Side-Channels
Side channels are unintended pathways within target systems that leak internal target information. Side-channel sensing (SCS) is the process of exploiting side channels to extract embedded target information.
Aaron Spence, Shaun Bangay
doaj +1 more source
From Lens to Prism: Device-Free Modeling and Recognition of Multi-Part Activities
Exploiting radio frequency signals with different physical characteristics of refraction and reflection of different parts and movements of the human body, most of the existing work focuses on the identification of single activity from a special part ...
Liu Wenyuan +5 more
doaj +1 more source
The adoption of deep neural networks for profiled side-channel attacks provides powerful options for leakage detection and key retrieval of secure products.
Guilherme Perin +2 more
semanticscholar +1 more source
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection [PDF]
Differential Power Analysis (DPA) has been an active area of research for the past two decades to study the attacks for extracting secret information from cryptographic implementations through power measurements and their defenses.
Anuj Dubey +2 more
semanticscholar +1 more source

