Results 21 to 30 of about 399,159 (347)
The privacy and security vulnerabilities in fifth-generation (5G)-enabled vehicular networks are often required to cope with schemes based on either bilinear pair cryptography (BPC) or elliptic curve cryptography (ECC). Nevertheless, these schemes suffer
Mahmood A. Al-Shareeda +8 more
semanticscholar +1 more source
Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques
Cache Side Channel Attacks (SCAs) have gained a lot of attention in the recent past. Since, these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous.
Ayaz Akram +4 more
doaj +1 more source
Cryptographic System-on-Chips (SoCs) are becoming more and more popular. In these systems, cryptographic accelerators are integrated with processor cores to provide users with the software’s flexibility and hardware’s high performance ...
Ba-Anh Dao +5 more
doaj +1 more source
Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks
The differential deep learning analysis proposed by Timon is the first non-profiled side-channel attack technique that uses deep learning. The technique recovers the secret key using the phenomenon of deep learning metrics.
Donggeun Kwon, Seokhie Hong, Heeseok Kim
semanticscholar +1 more source
A Memory Hierarchy Protected against Side-Channel Attacks
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valuable element to protect against information theft. Many first-order side-channel attacks have been reported on all its components from the main memory to ...
Ezinam Bertrand Talaki +3 more
doaj +1 more source
Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs
To lower cost and increase the utilization of Cloud Field-Programmable Gate Arrays (FPGAs), researchers have recently been exploring the concept of multi-tenant FPGAs, where multiple independent users simultaneously share the same remote FPGA.
Shayan Moini +4 more
semanticscholar +1 more source
Review of side-channel privacy inference of Android mobile devices
Android side channels may leak users’sensitive information.The existing Android side-channel attacks were analyzed and classified according to the type of the privacy-sensitive information with their inference models.The mainstream privacy inference ...
Futian SHI,Jian MAO,Jianwei LIU
doaj +3 more sources
IMPLEMENTATION OF SIDE-CHANNEL LEAKAGE DETECTION TECHNIQUE BASED ON NORMALIZED INTER-CLASS VARIANCE METHOD [PDF]
The paper presents anew mathematical method for parasitic signal analyzing. NICV (Normalized Inter-Class Variance) method allows reducing considerably of computing and time expenditure in carrying out side channel attacks.
A. B. Levina, P. S. Borisenko
doaj +1 more source
Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj +1 more source
Embedded Systems and their Vulnerabilities to Hardware Attacks [PDF]
The article describes the types of hardware attacks targeting embedded systems,countermeasures, and methods of modelling security threats. In currently used electronic devices, thesoftware usually ensures very high level of security.
Konrad Szczepankiewicz, Marian Wnuk
doaj +1 more source

