Results 1 to 10 of about 514,969 (347)

ThermalBleed: A Practical Thermal Side-Channel Attack

open access: yesIEEE Access, 2022
Modern OSs expose an interface for monitoring CPU temperature to unprivileged users for effective user decision-based thermal management. Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction of ...
Taehun Kim, Youngjoo Shin
doaj   +2 more sources

Frequency Throttling Side-Channel Attack [PDF]

open access: yesProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Modern processors dynamically control their operating frequency to optimize resource utilization, maximize energy savings, and conform to system-defined constraints. If, during the execution of a software workload, the running average of any electrical or thermal parameter exceeds its corresponding predefined threshold value, the power management ...
Liu, Chen   +3 more
openaire   +3 more sources

Side-Channel Attacks [PDF]

open access: gold, 2019
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Muhammad Yasin   +2 more
  +8 more sources

A Key-Recovery Side-Channel Attack on Classic McEliece Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in the NIST Post-quantum Cryptography Standardization Project.
Qian Guo   +2 more
doaj   +4 more sources

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +2 more sources

Smartphone barometer can hear, and sense finger taps [PDF]

open access: yesCybersecurity
Nearly all modern smartphones are now equipped with a barometer to sample air pressure. Accessing these samples is deemed harmless, hence does not require permission.
Alireza Hafez   +2 more
doaj   +2 more sources

Efficient AES Side-Channel Attacks Based on Residual Mamba Enhanced CNN [PDF]

open access: yesEntropy
With the continuous advancement of side-channel attacks (SCA), deep learning-based methods have emerged as a prominent research focus due to their powerful feature extraction and nonlinear modeling capabilities. Traditional convolutional neural networks (
Zhaobin Li, Chenchong Du, Xiaoyi Duan
doaj   +2 more sources

A Practical Deep Learning-Based Acoustic Side Channel Attack on Keyboards [PDF]

open access: yes2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2023
With recent developments in deep learning, the ubiquity of microphones and the rise in online services via personal devices, acoustic side channel attacks present a greater threat to keyboards than ever.
Joshua Harrison   +2 more
semanticscholar   +1 more source

Side-Channel Attack Analysis on In-Memory Computing Architectures [PDF]

open access: yesIEEE Transactions on Emerging Topics in Computing, 2022
In-memory computing (IMC) systems have great potential for accelerating data-intensive tasks such as deep neural networks (DNNs). As DNN models are generally highly proprietary, the neural network architectures become valuable targets for attacks. In IMC
Ziyu Wang   +4 more
semanticscholar   +1 more source

A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber

open access: yesIEEE European Test Symposium, 2023
CRYSTALS-Kyber has been recently selected by the NIST as a new public-key encryption and key-establishment algorithm to be standardized. This makes it important to assess how well CRYSTALS-Kyber implementations withstand side-channel attacks.
Yan Ji   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy