Results 11 to 20 of about 514,969 (347)
Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX
Software Guard Extension (SGX) is a hardware-based trusted execution environment (TEE) implemented in recent Intel commodity processors. By isolating the memory of security-critical applications from untrusted software, this mechanism provides users with
Tianlin Huo +6 more
semanticscholar +3 more sources
A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks. [PDF]
Cao Y, Zhao X, Ye W, Han Q, Pan X.
europepmc +3 more sources
Tight and Scalable Side-Channel Attack Evaluations through Asymptotically Optimal Massey-like Inequalities on Guessing Entropy. [PDF]
Tănăsescu A +3 more
europepmc +3 more sources
Side Channel Analysis Attack Based on Deep Learning LSTM [PDF]
The security of encrypted data is affected by encryption algorithms and encryption devices.The reliability of the encryption devices can be tested by using multiple types of attacks, such as energy analysis.Among different attack methods, the method of ...
WANG Junnian, ZHU Bin, YU Wenxin, WANG Wan, HU Fanliang
doaj +1 more source
Deep Learning-based Side Channel Attack on HMAC SM3
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin +3 more
doaj +1 more source
The Best of Two Worlds: Deep Learning-assisted Template Attack
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu +2 more
doaj +1 more source
Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj +1 more source
Survey of side channel attack on encrypted network traffic
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
LI Ding, ZHU Yuefei, LU Bin, LIN Wei
doaj +3 more sources
Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation ...
Somdip Dey +2 more
doaj +1 more source
Key‐dependent side‐channel cube attack on CRAFT
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang +1 more
doaj +1 more source

