Results 11 to 20 of about 230,889 (263)
Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj +1 more source
Embedded Systems and their Vulnerabilities to Hardware Attacks [PDF]
The article describes the types of hardware attacks targeting embedded systems,countermeasures, and methods of modelling security threats. In currently used electronic devices, thesoftware usually ensures very high level of security.
Konrad Szczepankiewicz, Marian Wnuk
doaj +1 more source
Review of side-channel privacy inference of Android mobile devices
Android side channels may leak users’sensitive information.The existing Android side-channel attacks were analyzed and classified according to the type of the privacy-sensitive information with their inference models.The mainstream privacy inference ...
Futian SHI,Jian MAO,Jianwei LIU
doaj +3 more sources
SonarSnoop: active acoustic side-channel attacks [PDF]
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.
Peng Cheng +3 more
openaire +5 more sources
Special Issue on “Side Channel Attacks”
Cryptosystems are widely used in a growing number of embedded applications, such as smart cards, smart phones, Internet of Things (IoT) devices, and so on [...]
Seokhie Hong
doaj +1 more source
Physical functions : the common factor of side-channel and fault attacks ? [PDF]
International audienceSecurity is a key component for information technologies and communication. Among the security threats, a very important one is certainly due to vulnerabilities of the integrated circuits that implement cryptographic algorithms ...
Le Bouder, Hélène, Robisson, Bruno
core +5 more sources
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
The Best of Two Worlds: Deep Learning-assisted Template Attack
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu +2 more
doaj +1 more source
Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks
Crypto libraries such as OpenSSL and Libgcrypt are essential building blocks for implementing secure cloud services. Unfortunately, these libraries are subject to cache side-channel attacks, which are more devastating in cloud environments where ...
Youngjoo Shin, Joobeom Yun
doaj +1 more source
Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? [PDF]
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural Attacks, the result of these vulnerabilities, take advantage of Microarchitectural performance ...
A.Clements +58 more
core +2 more sources

