Results 41 to 50 of about 5,942,634 (324)

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Malware Guard Extension: abusing Intel SGX to conceal cache attacks

open access: yesCybersecurity, 2020
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz   +4 more
doaj   +1 more source

Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]

open access: yes, 2017
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika   +18 more
core   +2 more sources

Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders

open access: yesIACR Cryptology ePrint Archive, 2020
In the profiled side-channel analysis, deep learning-based techniques proved to be very successful even when attacking targets protected with countermeasures. Still, there is no guarantee that deep learning attacks will always succeed.
Lichao Wu, S. Picek
semanticscholar   +1 more source

A Novel Side-Channel in Real-Time Schedulers

open access: yes, 2019
We demonstrate the presence of a novel scheduler side-channel in preemptive, fixed-priority real-time systems (RTS); examples of such systems can be found in automotive systems, avionic systems, power plants and industrial control systems among others ...
Bobba, Rakesh B.   +4 more
core   +1 more source

Breaking a quantum key distribution system through a timing side channel [PDF]

open access: yes, 2007
The security of quantum key distribution relies on the validity of quantum mechanics as a description of nature and on the non-existence of leaky degrees of freedom in the practical implementations.
Kurtsiefer, Christian   +1 more
core   +1 more source

Domain-Agnostic Representation of Side-Channels

open access: yesEntropy
Side channels are unintended pathways within target systems that leak internal target information. Side-channel sensing (SCS) is the process of exploiting side channels to extract embedded target information.
Aaron Spence, Shaun Bangay
doaj   +1 more source

From Lens to Prism: Device-Free Modeling and Recognition of Multi-Part Activities

open access: yesIEEE Access, 2018
Exploiting radio frequency signals with different physical characteristics of refraction and reflection of different parts and movements of the human body, most of the existing work focuses on the identification of single activity from a special part ...
Liu Wenyuan   +5 more
doaj   +1 more source

Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
The adoption of deep neural networks for profiled side-channel attacks provides powerful options for leakage detection and key retrieval of secure products.
Guilherme Perin   +2 more
semanticscholar   +1 more source

MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection [PDF]

open access: yesIEEE International Symposium on Hardware Oriented Security and Trust, 2019
Differential Power Analysis (DPA) has been an active area of research for the past two decades to study the attacks for extracting secret information from cryptographic implementations through power measurements and their defenses.
Anuj Dubey   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy