Results 1 to 10 of about 346,808 (259)

Smartphone barometer can hear, and sense finger taps [PDF]

open access: yesCybersecurity
Nearly all modern smartphones are now equipped with a barometer to sample air pressure. Accessing these samples is deemed harmless, hence does not require permission.
Alireza Hafez   +2 more
doaj   +2 more sources

Efficient AES Side-Channel Attacks Based on Residual Mamba Enhanced CNN [PDF]

open access: yesEntropy
With the continuous advancement of side-channel attacks (SCA), deep learning-based methods have emerged as a prominent research focus due to their powerful feature extraction and nonlinear modeling capabilities. Traditional convolutional neural networks (
Zhaobin Li, Chenchong Du, Xiaoyi Duan
doaj   +2 more sources

Side-Channel Attacks [PDF]

open access: yes, 2019
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Muhammad Yasin   +2 more
  +6 more sources

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +1 more source

Side Channel Analysis Attack Based on Deep Learning LSTM [PDF]

open access: yesJisuanji gongcheng, 2021
The security of encrypted data is affected by encryption algorithms and encryption devices.The reliability of the encryption devices can be tested by using multiple types of attacks, such as energy analysis.Among different attack methods, the method of ...
WANG Junnian, ZHU Bin, YU Wenxin, WANG Wan, HU Fanliang
doaj   +1 more source

ThermalBleed: A Practical Thermal Side-Channel Attack

open access: yesIEEE Access, 2022
Modern OSs expose an interface for monitoring CPU temperature to unprivileged users for effective user decision-based thermal management. Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction of ...
Taehun Kim, Youngjoo Shin
doaj   +1 more source

The Best of Two Worlds: Deep Learning-assisted Template Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu   +2 more
doaj   +1 more source

Survey of side channel attack on encrypted network traffic

open access: yes网络与信息安全学报, 2021
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
LI Ding, ZHU Yuefei, LU Bin, LIN Wei
doaj   +3 more sources

Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters

open access: yesIEEE Access, 2023
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj   +1 more source

Key‐dependent side‐channel cube attack on CRAFT

open access: yesETRI Journal, 2021
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy