Results 21 to 30 of about 350,749 (324)
The Best of Two Worlds: Deep Learning-assisted Template Attack
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu +2 more
doaj +1 more source
Survey of side channel attack on encrypted network traffic
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
Ding LI, Yuefei ZHU, Bin LU, Wei LIN
doaj +3 more sources
Key‐dependent side‐channel cube attack on CRAFT
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang +1 more
doaj +1 more source
Deep Learning-based Side Channel Attack on HMAC SM3.
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin +3 more
doaj +1 more source
Algebraic Side Channel Attack Against EPCBC Based on Hamming Weight [PDF]
In order to assess the security of EPCBC cipher,this paper proposes an algebraic side channel attack method based on Hamming weight,and studies factors which affect the attack efficiency.The algebraic equations of the algorithm are constructed.The power ...
LING Hang,WU Zhen,DU Zhibo,WANG Min,RAO Jintao
doaj +1 more source
JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos +3 more
doaj +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz +4 more
doaj +1 more source
Application of Neural Networks to Power Analysis
The purpose of this work is to research the possibility of a side-channel attack, more precisely power consumption attack (recovering the encryption key according to the board’s power consumption schedule) on the AES-128 algorithm implemented in hardware.
Alla Levina, Roman Bolozovskii
doaj +1 more source
SonarSnoop: active acoustic side-channel attacks [PDF]
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.
Peng Cheng +3 more
openaire +5 more sources

