Results 11 to 20 of about 399,159 (347)

Side Channel Attacks [PDF]

open access: gold, 2019
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Seokhie Hong
  +8 more sources

Side Channel Attacks on GPUs

open access: yesIEEE Transactions on Dependable and Secure Computing, 2021
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used ...
Hoda Naghibijouybari   +3 more
semanticscholar   +2 more sources

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

open access: yesIACR Cryptology ePrint Archive, 2023
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Yutaro Tanaka   +5 more
semanticscholar   +1 more source

A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis

open access: yesSensors, 2022
Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature.
Petr Socha   +2 more
doaj   +1 more source

Risky Translations: Securing TLBs against Timing Side Channels

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to bypass common security boundaries like memory isolation.
Florian Stolz   +3 more
doaj   +1 more source

Physical Side-Channel Attacks on Embedded Neural Networks: A Survey [PDF]

open access: yesApplied Sciences, 2021
During the last decade, Deep Neural Networks (DNN) have progressively been integrated on all types of platforms, from data centers to embedded systems including low-power processors and, recently, FPGAs.
M. M. Real, R. Salvador
semanticscholar   +1 more source

Guarding Machine Learning Hardware Against Physical Side-channel Attacks [PDF]

open access: yesACM Journal on Emerging Technologies in Computing Systems, 2021
Machine learning (ML) models can be trade secrets due to their development cost. Hence, they need protection against malicious forms of reverse engineering (e.g., in IP piracy).
Anuj Dubey   +3 more
semanticscholar   +1 more source

Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks [PDF]

open access: yesIEEE Symposium on Security and Privacy, 2021
Modern x86 processors have many prefetch instructions that can be used by programmers to boost performance. However, these instructions may also cause security problems.
Yanan Guo   +3 more
semanticscholar   +1 more source

On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage

open access: yesIACR Cryptology ePrint Archive, 2022
This study derives information-theoretical bounds of the success rate (SR) of side-channel attacks on masked implementations. We first develop a communication channel model representing side-channel attacks on masked implementations.
Akira Ito, Rei Ueno, N. Homma
semanticscholar   +1 more source

Quantile: Quantifying Information Leakage

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
The masking countermeasure is very effective against side-channel attacks such as differential power analysis. However, the design of masked circuits is a challenging problem since one has to ensure security while minimizing performance overheads.
Vedad Hadžic   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy