Results 301 to 310 of about 514,969 (347)
Some of the next articles are maybe not open access.
VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets
IEEE Conference on Virtual Reality and 3D User Interfaces, 2021In Virtual Reality (VR), users typically interact with the virtual world using virtual keyboard to insert keywords, surfing the webpages, or typing passwords to access online accounts.
Abdullah Al Arafat +2 more
semanticscholar +1 more source
Multilabel Deep Learning-Based Side-Channel Attack
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021In recent years, deep learning methods make a big difference in side-channel attack (SCA) community especially in the profiled scenario. Multiclass classification method is the common way to complete such classification task.
Libang Zhang +4 more
semanticscholar +1 more source
Far Field EM Side-Channel Attack on AES Using Deep Learning
IACR Cryptology ePrint Archive, 2020We present the first deep learning-based side-channel attack on AES-128 using far field electromagnetic emissions as a side channel. Our neural networks are trained on traces captured from five different Bluetooth devices at five different distances to ...
Ruize Wang, Huanyu Wang, E. Dubrova
semanticscholar +1 more source
BranchScope: A New Side-Channel Attack on Directional Branch Predictor
International Conference on Architectural Support for Programming Languages and Operating Systems, 2018We present BranchScope - a new side-channel attack where the attacker infers the direction of an arbitrary conditional branch instruction in a victim program by manipulating the shared directional branch predictor. The directional component of the branch
Dmitry Evtyushkin +3 more
semanticscholar +1 more source
2007 44th ACM/IEEE Design Automation Conference, 2007
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire +1 more source
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire +1 more source
Side Channel Attacks vs Approximate Computing
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 2020Approximate computing is an architectural paradigm where limited and controlled errors during computation are tolerated. Thanks to approximation, circuits can be faster, more compact, and consume less power. Security aspects of these circuits are however largely unexplored.
Regazzoni, F., Polian, I.
openaire +3 more sources
IEEE Transactions on Industrial Informatics, 2020
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors and actuators to empower industrial sectors being smart, autonomous, efficient, and safety.
Dajiang Chen +6 more
semanticscholar +1 more source
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors and actuators to empower industrial sectors being smart, autonomous, efficient, and safety.
Dajiang Chen +6 more
semanticscholar +1 more source
Power Side Channel Attack Analysis and Detection
2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2020Side Channel Attack (SCA) is a serious threat to the hardware implementation of cryptographic protocols. Various side channels such as, power, timing, electromagnetic emission and acoustic noise have been explored to extract the secret keys.
Navyata Gattu +3 more
semanticscholar +1 more source
Electromagnetic side-channel attacks
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018Digital forensics is fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are often hampered by the data contained on these devices being encrypted.
Asanka Sayakkara +2 more
openaire +1 more source
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES
International Symposium on Smart Electronic Systems, 2020The majority of recently demonstrated deep-learning side-channel attacks use a single neural network classifier to recover the key. The potential benefits of combining multiple classifiers with ensemble learning method have not been fully explored in the
Huanyu Wang, E. Dubrova
semanticscholar +1 more source

