Results 1 to 10 of about 399,159 (347)

Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. [PDF]

open access: yesSensors (Basel), 2022
The invention of smart low-power devices and ubiquitous Internet connectivity have facilitated the shift of many labour-intensive jobs into the digital domain.
Alahmadi AN   +5 more
europepmc   +2 more sources

Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection [PDF]

open access: goldFuture Internet, 2023
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices—a Raspberry Pi 3 model B and a ...
Dominic Lightbody   +4 more
doaj   +2 more sources

Side-Channel Attacks on Masked Bitsliced Implementations of AES [PDF]

open access: goldCryptography, 2022
In this paper, we provide a detailed analysis of CPA and Template Attacks on masked implementations of bitsliced AES, targeting a 32-bit platform through the ChipWhisperer side-channel acquisition tool.
Anca Rădulescu, Marios O. Choudary
doaj   +2 more sources

Side-Channel Expectation-Maximization Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used.
Julien Béguinot   +3 more
doaj   +5 more sources

Side channel attacks for architecture extraction of neural networks

open access: yesCAAI Transactions on Intelligence Technology, 2021
Side channel attacks (SCAs) on neural networks (NNs) are particularly efficient for retrieving secret information from NNs. We differentiate multiple types of threat scenarios regarding what kind of information is available before the attack and its ...
Hervé Chabanne   +3 more
doaj   +2 more sources

Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems [PDF]

open access: yesInternational Symposium on Computer Architecture, 2022
The deep learning revolution has been enabled in large part by GPUs, and more recently accelerators, which make it possible to carry out computationally demanding training and inference in acceptable times.
S. B. Dutta   +5 more
semanticscholar   +1 more source

DF-SCA: Dynamic Frequency Side Channel Attacks are Practical [PDF]

open access: yesAsia-Pacific Computer Systems Architecture Conference, 2022
The arm race between hardware security engineers and side-channel researchers has become more competitive with more sophisticated attacks and defenses in the last decade.
Debopriya Roy Dipta, Berk Gulmezoglu
semanticscholar   +1 more source

Wireless Charging Power Side-Channel Attacks [PDF]

open access: yesConference on Computer and Communications Security, 2021
This paper demonstrates that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone that charges wirelessly leaks information about its activity to the wireless charger transmitter.
Alexander La Cour, K. Afridi, G. Suh
semanticscholar   +1 more source

Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond

open access: yesIACR Cryptology ePrint Archive, 2023
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen-ciphertext setting, and are fairly generic and easy to mount on a given target,
Gokulnath Rajendran   +4 more
semanticscholar   +1 more source

Side Channel Analysis Attack Based on Deep Learning LSTM [PDF]

open access: yesJisuanji gongcheng, 2021
The security of encrypted data is affected by encryption algorithms and encryption devices.The reliability of the encryption devices can be tested by using multiple types of attacks, such as energy analysis.Among different attack methods, the method of ...
WANG Junnian, ZHU Bin, YU Wenxin, WANG Wan, HU Fanliang
doaj   +1 more source

Home - About - Disclaimer - Privacy