Results 21 to 30 of about 231,688 (280)
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks
Crypto libraries such as OpenSSL and Libgcrypt are essential building blocks for implementing secure cloud services. Unfortunately, these libraries are subject to cache side-channel attacks, which are more devastating in cloud environments where ...
Youngjoo Shin, Joobeom Yun
doaj +1 more source
Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? [PDF]
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural Attacks, the result of these vulnerabilities, take advantage of Microarchitectural performance ...
A.Clements +58 more
core +2 more sources
Linear Repairing Codes and Side-Channel Attacks
To strengthen the resistance of countermeasures based on secret sharing,several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d-degree polynomial into n ≥ d + 1 public points to ...
Hervé Chabanne +2 more
doaj +1 more source
Strengthening Sequential Side-Channel Attacks Through Change Detection
The sequential structure of some side-channel attacks makes them subject to error propagation, i.e. when an error occurs during the recovery of some part of a secret key, all the following guesses might as well be chosen randomly.
Luca Frittoli +7 more
doaj +1 more source
An Evaluation of Power Side-Channel Resistance for RNS Secure Logic
In this paper, residue number system (RNS) based logic is proposed as a protection against power side-channel attacks. Every input to RNS logic is encrypted as a share of the original input in the residue domain through modulus values.
Ravikumar Selvam, Akhilesh Tyagi
doaj +1 more source
Will You Cross the Threshold for Me?
In this work, we propose generic and novel side-channel assisted chosenciphertext attacks on NTRU-based key encapsulation mechanisms (KEMs). These KEMs are IND-CCA secure, that is, they are secure in the chosen-ciphertext model.
Prasanna Ravi +4 more
doaj +1 more source
Kangaroos in Side-Channel Attacks [PDF]
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems significantly more unknown bits can be handled by using Pollard's ...
Lange, T. +2 more
openaire +3 more sources
Attacks on IoT: Side-Channel Power Acquisition Framework for Intrusion Detection
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices—a Raspberry Pi 3 model B and a ...
Dominic Lightbody +4 more
doaj +1 more source
Experimental measurement-device-independent quantum digital signatures over a metropolitan network [PDF]
Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable
Andersson, Erika +18 more
core +2 more sources

