Results 11 to 20 of about 399,159 (347)
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Seokhie Hong
+8 more sources
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used ...
Hoda Naghibijouybari +3 more
semanticscholar +2 more sources
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Yutaro Tanaka +5 more
semanticscholar +1 more source
A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis
Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature.
Petr Socha +2 more
doaj +1 more source
Risky Translations: Securing TLBs against Timing Side Channels
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to bypass common security boundaries like memory isolation.
Florian Stolz +3 more
doaj +1 more source
Physical Side-Channel Attacks on Embedded Neural Networks: A Survey [PDF]
During the last decade, Deep Neural Networks (DNN) have progressively been integrated on all types of platforms, from data centers to embedded systems including low-power processors and, recently, FPGAs.
M. M. Real, R. Salvador
semanticscholar +1 more source
Guarding Machine Learning Hardware Against Physical Side-channel Attacks [PDF]
Machine learning (ML) models can be trade secrets due to their development cost. Hence, they need protection against malicious forms of reverse engineering (e.g., in IP piracy).
Anuj Dubey +3 more
semanticscholar +1 more source
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks [PDF]
Modern x86 processors have many prefetch instructions that can be used by programmers to boost performance. However, these instructions may also cause security problems.
Yanan Guo +3 more
semanticscholar +1 more source
This study derives information-theoretical bounds of the success rate (SR) of side-channel attacks on masked implementations. We first develop a communication channel model representing side-channel attacks on masked implementations.
Akira Ito, Rei Ueno, N. Homma
semanticscholar +1 more source
Quantile: Quantifying Information Leakage
The masking countermeasure is very effective against side-channel attacks such as differential power analysis. However, the design of masked circuits is a challenging problem since one has to ensure security while minimizing performance overheads.
Vedad Hadžic +4 more
doaj +1 more source

