Results 301 to 310 of about 514,969 (347)
Some of the next articles are maybe not open access.

VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets

IEEE Conference on Virtual Reality and 3D User Interfaces, 2021
In Virtual Reality (VR), users typically interact with the virtual world using virtual keyboard to insert keywords, surfing the webpages, or typing passwords to access online accounts.
Abdullah Al Arafat   +2 more
semanticscholar   +1 more source

Multilabel Deep Learning-Based Side-Channel Attack

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
In recent years, deep learning methods make a big difference in side-channel attack (SCA) community especially in the profiled scenario. Multiclass classification method is the common way to complete such classification task.
Libang Zhang   +4 more
semanticscholar   +1 more source

Far Field EM Side-Channel Attack on AES Using Deep Learning

IACR Cryptology ePrint Archive, 2020
We present the first deep learning-based side-channel attack on AES-128 using far field electromagnetic emissions as a side channel. Our neural networks are trained on traces captured from five different Bluetooth devices at five different distances to ...
Ruize Wang, Huanyu Wang, E. Dubrova
semanticscholar   +1 more source

BranchScope: A New Side-Channel Attack on Directional Branch Predictor

International Conference on Architectural Support for Programming Languages and Operating Systems, 2018
We present BranchScope - a new side-channel attack where the attacker infers the direction of an arbitrary conditional branch instruction in a victim program by manipulating the shared directional branch predictor. The directional component of the branch
Dmitry Evtyushkin   +3 more
semanticscholar   +1 more source

Side-Channel Attack Pitfalls

2007 44th ACM/IEEE Design Automation Conference, 2007
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire   +1 more source

Side Channel Attacks vs Approximate Computing

Proceedings of the 2020 on Great Lakes Symposium on VLSI, 2020
Approximate computing is an architectural paradigm where limited and controlled errors during computation are tolerated. Thanks to approximation, circuits can be faster, more compact, and consume less power. Security aspects of these circuits are however largely unexplored.
Regazzoni, F., Polian, I.
openaire   +3 more sources

MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment

IEEE Transactions on Industrial Informatics, 2020
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors and actuators to empower industrial sectors being smart, autonomous, efficient, and safety.
Dajiang Chen   +6 more
semanticscholar   +1 more source

Power Side Channel Attack Analysis and Detection

2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2020
Side Channel Attack (SCA) is a serious threat to the hardware implementation of cryptographic protocols. Various side channels such as, power, timing, electromagnetic emission and acoustic noise have been explored to extract the secret keys.
Navyata Gattu   +3 more
semanticscholar   +1 more source

Electromagnetic side-channel attacks

Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018
Digital forensics is fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are often hampered by the data contained on these devices being encrypted.
Asanka Sayakkara   +2 more
openaire   +1 more source

Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES

International Symposium on Smart Electronic Systems, 2020
The majority of recently demonstrated deep-learning side-channel attacks use a single neural network classifier to recover the key. The potential benefits of combining multiple classifiers with ensemble learning method have not been fully explored in the
Huanyu Wang, E. Dubrova
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy