Results 201 to 210 of about 1,445,629 (248)

Identification of druggable binding sites and small molecules as modulators of TMC1. [PDF]

open access: yesCommun Biol
De-la-Torre P   +8 more
europepmc   +1 more source

Airway smooth muscle--on-a-chip: a microfluidic approach to study alveolar smooth muscle remodelling

open access: yes
Suhail A   +8 more
europepmc   +1 more source

Abacus: Precise Side-Channel Analysis

2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021
Side-channel attacks allow adversaries to infer sensitive information from non-functional characteristics. Prior side-channel detection work is able to identify numerous potential vulnerabilities. However, in practice, many such vulnerabilities leak a negligible amount of sensitive information, and thus developers are often reluctant to address them ...
Bao, Qinkun   +4 more
openaire   +3 more sources

Side channel analysis of SPECK

Journal of Computer Security, 2020
SPECK is a family of lightweight block ciphers developed by Beaulieu et al. of the US National Security Agency (NSA) for the Internet of Things (IoT). It is an ARX-based design with a Feistel-like structure which supports keys of size ranging from 64 bits to 256 bits.
R. Balasubramanian   +3 more
openaire   +2 more sources

Use of Simulators for Side-Channel Analysis

2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017
Side-channel attacks are among the most powerful and cost-effective attacks on cryptographic systems. Simulators that are developed for side-channel analysis are very useful for preliminary analysis of new schemes, in depth analysis of existing schemes as well as for analysis of products on early stages of development. The contribution of this paper is
Sylvain Guilley, Nikita Veshchikov
openaire   +2 more sources

Side channel analysis of an automotive microprocessor

IET Irish Signals and Systems Conference (ISSC 2008), 2008
Automotive electronics are becoming ever more complex. The quantity and sensitivity of data that is transmitted throughout a car is expected to continue to increase in coming years. On board computers can contain information about the car and dictate how the car behaves.
Hamilton, Mark   +3 more
openaire   +2 more sources

Abacus: A Tool for Precise Side-Channel Analysis

2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), 2021
Side-channel vulnerabilities can leak sensitive information unconsciously. In this paper, we introduce the usage of Abacus. Abacus is a tool that can analyze secret-dependent control-flow and secret-dependent data-access leakages in binary programs.
Bao, Qinkun   +3 more
openaire   +2 more sources

Federated Learning in Side-Channel Analysis

2021
Recently introduced federated learning is an attractive framework for the distributed training of deep learning models with thousands of participants. However, it can potentially be used with malicious intent. For example, adversaries can use their smartphones to jointly train a classifier for extracting secret keys from the smartphones’ SIM cards ...
Huanyu Wang, Elena Dubrova
openaire   +2 more sources

Side-Channel Analysis of Keymill

2017
One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to withstand ...
Thomas Korak   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy