Results 11 to 20 of about 231,688 (280)
Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture. [PDF]
Alahmadi AN +5 more
europepmc +2 more sources
IMPLEMENTATION OF SIDE-CHANNEL LEAKAGE DETECTION TECHNIQUE BASED ON NORMALIZED INTER-CLASS VARIANCE METHOD [PDF]
The paper presents anew mathematical method for parasitic signal analyzing. NICV (Normalized Inter-Class Variance) method allows reducing considerably of computing and time expenditure in carrying out side channel attacks.
A. B. Levina, P. S. Borisenko
doaj +1 more source
Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj +1 more source
Embedded Systems and their Vulnerabilities to Hardware Attacks [PDF]
The article describes the types of hardware attacks targeting embedded systems,countermeasures, and methods of modelling security threats. In currently used electronic devices, thesoftware usually ensures very high level of security.
Konrad Szczepankiewicz, Marian Wnuk
doaj +1 more source
Review of side-channel privacy inference of Android mobile devices
Android side channels may leak users’sensitive information.The existing Android side-channel attacks were analyzed and classified according to the type of the privacy-sensitive information with their inference models.The mainstream privacy inference ...
Futian SHI,Jian MAO,Jianwei LIU
doaj +3 more sources
SonarSnoop: active acoustic side-channel attacks [PDF]
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.
Peng Cheng +3 more
openaire +5 more sources
Physical functions : the common factor of side-channel and fault attacks ? [PDF]
International audienceSecurity is a key component for information technologies and communication. Among the security threats, a very important one is certainly due to vulnerabilities of the integrated circuits that implement cryptographic algorithms ...
Le Bouder, Hélène, Robisson, Bruno
core +5 more sources
Special Issue on “Side Channel Attacks”
Cryptosystems are widely used in a growing number of embedded applications, such as smart cards, smart phones, Internet of Things (IoT) devices, and so on [...]
Seokhie Hong
doaj +1 more source
Insecurity of detector-device-independent quantum key distribution [PDF]
Detector-device-independent quantum key distribution (ddiQKD) held the promise of being robust to detector side-channels, a major security loophole in QKD implementations. In contrast to what has been claimed, however, we demonstrate that the security of
Curty, Marcos +5 more
core +2 more sources
The Best of Two Worlds: Deep Learning-assisted Template Attack
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu +2 more
doaj +1 more source

