Results 21 to 30 of about 399,159 (347)

Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks

open access: yesApplied Sciences, 2022
The privacy and security vulnerabilities in fifth-generation (5G)-enabled vehicular networks are often required to cope with schemes based on either bilinear pair cryptography (BPC) or elliptic curve cryptography (ECC). Nevertheless, these schemes suffer
Mahmood A. Al-Shareeda   +8 more
semanticscholar   +1 more source

Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques

open access: yesIEEE Access, 2020
Cache Side Channel Attacks (SCAs) have gained a lot of attention in the recent past. Since, these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous.
Ayaz Akram   +4 more
doaj   +1 more source

Correlation Power Analysis Attack Resisted Cryptographic RISC-V SoC With Random Dynamic Frequency Scaling Countermeasure

open access: yesIEEE Access, 2021
Cryptographic System-on-Chips (SoCs) are becoming more and more popular. In these systems, cryptographic accelerators are integrated with processor cores to provide users with the software’s flexibility and hardware’s high performance ...
Ba-Anh Dao   +5 more
doaj   +1 more source

Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks

open access: yesIEEE Access, 2022
The differential deep learning analysis proposed by Timon is the first non-profiled side-channel attack technique that uses deep learning. The technique recovers the secret key using the phenomenon of deep learning metrics.
Donggeun Kwon, Seokhie Hong, Heeseok Kim
semanticscholar   +1 more source

A Memory Hierarchy Protected against Side-Channel Attacks

open access: yesCryptography, 2022
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valuable element to protect against information theft. Many first-order side-channel attacks have been reported on all its components from the main memory to ...
Ezinam Bertrand Talaki   +3 more
doaj   +1 more source

Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs

open access: yesIEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2021
To lower cost and increase the utilization of Cloud Field-Programmable Gate Arrays (FPGAs), researchers have recently been exploring the concept of multi-tenant FPGAs, where multiple independent users simultaneously share the same remote FPGA.
Shayan Moini   +4 more
semanticscholar   +1 more source

Review of side-channel privacy inference of Android mobile devices

open access: yes网络与信息安全学报, 2018
Android side channels may leak users’sensitive information.The existing Android side-channel attacks were analyzed and classified according to the type of the privacy-sensitive information with their inference models.The mainstream privacy inference ...
Futian SHI,Jian MAO,Jianwei LIU
doaj   +3 more sources

IMPLEMENTATION OF SIDE-CHANNEL LEAKAGE DETECTION TECHNIQUE BASED ON NORMALIZED INTER-CLASS VARIANCE METHOD [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2016
The paper presents anew mathematical method for parasitic signal analyzing. NICV (Normalized Inter-Class Variance) method allows reducing considerably of computing and time expenditure in carrying out side channel attacks.
A. B. Levina, P. S. Borisenko
doaj   +1 more source

Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters

open access: yesIEEE Access, 2023
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj   +1 more source

Embedded Systems and their Vulnerabilities to Hardware Attacks [PDF]

open access: yesBiuletyn Wojskowej Akademii Technicznej, 2023
The article describes the types of hardware attacks targeting embedded systems,countermeasures, and methods of modelling security threats. In currently used electronic devices, thesoftware usually ensures very high level of security.
Konrad Szczepankiewicz, Marian Wnuk
doaj   +1 more source

Home - About - Disclaimer - Privacy