Results 21 to 30 of about 514,969 (347)
Machine learning has made it possible to mount powerful attacks through side channels that are otherwise challenging to exploit. However, due to the black-box nature of machine learning models, these attacks can be difficult to interpret correctly ...
Jack Cook +3 more
semanticscholar +1 more source
Algebraic Side Channel Attack Against EPCBC Based on Hamming Weight [PDF]
In order to assess the security of EPCBC cipher,this paper proposes an algebraic side channel attack method based on Hamming weight,and studies factors which affect the attack efficiency.The algebraic equations of the algorithm are constructed.The power ...
LING Hang,WU Zhen,DU Zhibo,WANG Min,RAO Jintao
doaj +1 more source
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM
In this paper, we present a side-channel attack on a first-order masked implementation of IND-CCA secure Saber KEM. We show how to recover both the session key and the long-term secret key from 24 traces using a deep neural network created at the ...
Kalle Ngo +3 more
semanticscholar +1 more source
Tandem Deep Learning Side-Channel Attack on FPGA Implementation of AES
Side-channel attacks have become a realistic threat to implementations of cryptographic algorithms, especially with the help of deep-learning techniques. The majority of recently demonstrated deep-learning side-channel attacks use a single neural network
Huanyu Wang, E. Dubrova
semanticscholar +1 more source
JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos +3 more
doaj +1 more source
Application of Neural Networks to Power Analysis
The purpose of this work is to research the possibility of a side-channel attack, more precisely power consumption attack (recovering the encryption key according to the board’s power consumption schedule) on the AES-128 algorithm implemented in hardware.
Alla Levina, Roman Bolozovskii
doaj +1 more source
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz +4 more
doaj +1 more source
SonarSnoop: active acoustic side-channel attacks [PDF]
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.
Peng Cheng +3 more
openaire +5 more sources
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in which sensitive information can be recovered by analyzing physical phenomena of a device during operation.
M. Randolph, William Diehl
semanticscholar +1 more source

