Results 41 to 50 of about 32,448 (286)
Defeating Hardware Prefetchers in Flush+Reload Side-Channel Attack
Hardware prefetching can seriously interfere with Flush+Reload cache side channel attack. This interference is not taken into consideration in previous Flush+Reload attacks.
Zihao Wang+3 more
doaj +1 more source
Dynamic migration method of key virtual network function based on risk awareness
Aiming at the problems that traditional dynamic migration methods have many migration nodes,high migration frequency,and long service function chain (SFC) link path after migration when dealing with side channel attack,a dynamic migration method of ...
Shaohu DING+4 more
doaj +2 more sources
Codes for Side-Channel Attacks and Protections [PDF]
This article revisits side-channel analysis from the standpoint of coding theory. On the one hand, the attacker is shown to apply an optimal decoding algorithm in order to recover the secret key from the analysis of the side-channel. On the other hand, the side-channel protections are presented as a coding problem where the information is mixed with ...
Guilley, Sylvain+2 more
openaire +2 more sources
In this paper, a deep-learning based power/EM analysis attack on the state-of-the-art RSA–CRT software implementation is proposed. Our method is applied to a side-channel-aware implementation with the Gnu Multi-Precision (MP) Library, which is a typical
Kotaro Saito+3 more
doaj +3 more sources
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
The distinguishing feature of the Internet of Things is that many devices get interconnected. The threat of side-channel attacks in this setting is less understood than the threat of traditional network and software exploitation attacks that are ...
Daniel Dinu, Ilya Kizhvatov
doaj +1 more source
Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor
Cache side channel attacks extract secret information by monitoring the cache behavior of a victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim.
Jonghyeon Cho+5 more
doaj +1 more source
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation
Deep learning (DL)-based techniques have recently proven to be very successful when applied to profiled side-channel attacks (SCA). In a real-world profiled SCA scenario, attackers gain knowledge about the target device by getting access to a similar ...
Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu
doaj +1 more source
A stepwise emergence of evolution in the RNA world
How did biological evolution emerge from chemical reactions? This perspective proposes a gradual scenario of self‐organization among RNA molecules, where catalytic feedback on random mixtures plays the central role. Short oligomers cross‐ligate, and self‐assembly enables heritable variations. An event of template‐externalization marks the transition to
Philippe Nghe
wiley +1 more source
RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted execution environment (TEE) that isolates secure and insecure applications. In this study, we propose a
Shoei Nashimoto+3 more
doaj +1 more source
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro+2 more
wiley +1 more source