Results 51 to 60 of about 5,942,634 (324)
CIDPro: Custom Instructions for Dynamic Program Diversification
Timing side-channel attacks pose a major threat to embedded systems due to their ease of accessibility. We propose CIDPro, a framework that relies on dynamic program diversification to mitigate timing side-channel leakage.
Biswas, Arnab Kumar +4 more
core +1 more source
Side-channel analysis in frequency domain with clustering
The alignment of power traces is one of the key factors affecting the success of side-channel analysis. Frequency-domain side-channel analysis can effectively solve the alignment of power traces in the time domain.
Cai Juesong +3 more
doaj +1 more source
Open DNN Box by Power Side-Channel Attack [PDF]
Deep neural networks are becoming popular and important assets of many AI companies. However, recent studies indicate that they are also vulnerable to adversarial attacks. Adversarial attacks can be either white-box or black-box.
Yun Xiang +9 more
semanticscholar +1 more source
Free Side-channel Cross-technology Communication in Wireless Networks
Enabling direct communication between wireless technologies immediately brings significant benefits including, but not limited to, cross-technology interference mitigation and context-aware smart operation.
He, Tian +3 more
core +1 more source
Risky Translations: Securing TLBs against Timing Side Channels
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to bypass common security boundaries like memory isolation.
Florian Stolz +3 more
doaj +1 more source
Intrusion Detection for IoT Environments Through Side-Channel and Machine Learning Techniques
The rise of the Internet of Things (IoT) technology during the past decade has resulted in multiple applications across a large variety of fields. Some of the data processed using this technology can be specially sensitive, and the devices involved can ...
Alejandro Dominguez Campos +3 more
doaj +1 more source
Side-Channel Evaluation Methodology on Software
Cryptographic implementations need to be robust amidst the widespread use of crypto-libraries and attacks targeting their implementation, such as side-channel attacks (SCA).
Sylvain Guilley +5 more
doaj +1 more source
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures
—The past decade has seen a plethora of side-channel attacks on various CPU components. Each new attack typically follows a whitebox analysis approach, which involves (i) identifying a specific shared CPU component, (ii) reversing its behavior on a ...
Ben Gras +4 more
semanticscholar +1 more source
A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics [PDF]
The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their pertinence to digital forensic investigations will increase into the foreseeable future.
Asanka P. Sayakkara +2 more
semanticscholar +1 more source
The newfound relationship between extrachromosomal DNAs and excised signal circles
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley +1 more source

