Results 11 to 20 of about 350,749 (324)
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Seokhie Hong
+8 more sources
Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation ...
Somdip Dey +2 more
doaj +3 more sources
Smartphone barometer can hear, and sense finger taps [PDF]
Nearly all modern smartphones are now equipped with a barometer to sample air pressure. Accessing these samples is deemed harmless, hence does not require permission.
Alireza Hafez +2 more
doaj +2 more sources
Although quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attack on
Dongjun Park +5 more
doaj +3 more sources
Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor
Cache side channel attacks extract secret information by monitoring the cache behavior of a victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim.
Jonghyeon Cho +5 more
doaj +3 more sources
Efficient AES Side-Channel Attacks Based on Residual Mamba Enhanced CNN [PDF]
With the continuous advancement of side-channel attacks (SCA), deep learning-based methods have emerged as a prominent research focus due to their powerful feature extraction and nonlinear modeling capabilities. Traditional convolutional neural networks (
Zhaobin Li, Chenchong Du, Xiaoyi Duan
doaj +2 more sources
Deep Learning Side-Channel Collision Attack
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj +1 more source
ThermalBleed: A Practical Thermal Side-Channel Attack
Modern OSs expose an interface for monitoring CPU temperature to unprivileged users for effective user decision-based thermal management. Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction of ...
Taehun Kim, Youngjoo Shin
doaj +1 more source
Side Channel Analysis Attack Based on Deep Learning LSTM [PDF]
The security of encrypted data is affected by encryption algorithms and encryption devices.The reliability of the encryption devices can be tested by using multiple types of attacks, such as energy analysis.Among different attack methods, the method of ...
WANG Junnian, ZHU Bin, YU Wenxin, WANG Wan, HU Fanliang
doaj +1 more source
Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj +1 more source

