Results 1 to 10 of about 399,159 (347)
Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. [PDF]
The invention of smart low-power devices and ubiquitous Internet connectivity have facilitated the shift of many labour-intensive jobs into the digital domain.
Alahmadi AN +5 more
europepmc +2 more sources
Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection [PDF]
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices—a Raspberry Pi 3 model B and a ...
Dominic Lightbody +4 more
doaj +2 more sources
Side-Channel Attacks on Masked Bitsliced Implementations of AES [PDF]
In this paper, we provide a detailed analysis of CPA and Template Attacks on masked implementations of bitsliced AES, targeting a 32-bit platform through the ChipWhisperer side-channel acquisition tool.
Anca Rădulescu, Marios O. Choudary
doaj +2 more sources
Side-Channel Expectation-Maximization Attacks
Block ciphers are protected against side-channel attacks by masking. On one hand, when the leakage model is unknown, second-order correlation attacks are typically used.
Julien Béguinot +3 more
doaj +5 more sources
Side channel attacks for architecture extraction of neural networks
Side channel attacks (SCAs) on neural networks (NNs) are particularly efficient for retrieving secret information from NNs. We differentiate multiple types of threat scenarios regarding what kind of information is available before the attack and its ...
Hervé Chabanne +3 more
doaj +2 more sources
Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems [PDF]
The deep learning revolution has been enabled in large part by GPUs, and more recently accelerators, which make it possible to carry out computationally demanding training and inference in acceptable times.
S. B. Dutta +5 more
semanticscholar +1 more source
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical [PDF]
The arm race between hardware security engineers and side-channel researchers has become more competitive with more sophisticated attacks and defenses in the last decade.
Debopriya Roy Dipta, Berk Gulmezoglu
semanticscholar +1 more source
Wireless Charging Power Side-Channel Attacks [PDF]
This paper demonstrates that today's wireless charging interface is vulnerable to power side-channel attacks; a smartphone that charges wirelessly leaks information about its activity to the wireless charger transmitter.
Alexander La Cour, K. Afridi, G. Suh
semanticscholar +1 more source
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen-ciphertext setting, and are fairly generic and easy to mount on a given target,
Gokulnath Rajendran +4 more
semanticscholar +1 more source
Side Channel Analysis Attack Based on Deep Learning LSTM [PDF]
The security of encrypted data is affected by encryption algorithms and encryption devices.The reliability of the encryption devices can be tested by using multiple types of attacks, such as energy analysis.Among different attack methods, the method of ...
WANG Junnian, ZHU Bin, YU Wenxin, WANG Wan, HU Fanliang
doaj +1 more source

