Results 311 to 320 of about 399,159 (347)
Some of the next articles are maybe not open access.
IEEE journal of biomedical and health informatics, 2022
Federated learning (FL) has recently emerged as a striking framework for allowing machine and deep learning models with thousands of participants to have distributed training to preserve the privacy of users’ data.
Abdul Rehman, Imran Razzak, Guandong Xu
semanticscholar +1 more source
Federated learning (FL) has recently emerged as a striking framework for allowing machine and deep learning models with thousands of participants to have distributed training to preserve the privacy of users’ data.
Abdul Rehman, Imran Razzak, Guandong Xu
semanticscholar +1 more source
FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks
Design Automation Conference, 2021This paper proposes the first side-channel attack on FALCON—a NIST Round-3 finalist for the post-quantum digital signature standard. We demonstrate a known-plaintext attack that uses the electromagnetic measurements of the device to extract the secret ...
Emre Karabulut, Aydin Aysu
semanticscholar +1 more source
IEEE International Symposium on Hardware Oriented Security and Trust, 2021
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalist and ...
Emre Karabulut, E. Alkım, Aydin Aysu
semanticscholar +1 more source
This paper proposes a new single-trace side-channel attack on lattice-based post-quantum protocols. We target the ω-small polynomial sampling of NTRU, NTRU Prime, and CRYSTALS-DILITHIUM algorithm implementations (which are NIST Round-3 finalist and ...
Emre Karabulut, E. Alkım, Aydin Aysu
semanticscholar +1 more source
Micro-architectural Cache Side-Channel Attacks and Countermeasures
Asia and South Pacific Design Automation Conference, 2021Central Processing Unit (CPU) is considered as the brain of a computer. If the CPU has vulnerabilities, the security of software running on it is difficult to be guaranteed.
Chaoqun Shen, Cong Chen, Jiliang Zhang
semanticscholar +1 more source
Design Automation Conference, 2021
Trusted execution environments (TEEs) are imported into processors to protect sensitive programs against a potentially malicious operating system (OS), though, they are announced not effective in defending microarchitecture ($\mu$ arch) side-channel ...
Zili Kou +3 more
semanticscholar +1 more source
Trusted execution environments (TEEs) are imported into processors to protect sensitive programs against a potentially malicious operating system (OS), though, they are announced not effective in defending microarchitecture ($\mu$ arch) side-channel ...
Zili Kou +3 more
semanticscholar +1 more source
Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning
Design Automation Conference, 2021Deep learning (DL) based profiling side channel analysis (SCA) pose a great threat to embedded devices. An adversary can break the target encryption engine through physical leakage of power or electromagnetic (EM) emanations collected from a profiling ...
Honggang Yu +3 more
semanticscholar +1 more source
2007 44th ACM/IEEE Design Automation Conference, 2007
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire +1 more source
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire +1 more source
Side Channel Attacks vs Approximate Computing
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 2020Approximate computing is an architectural paradigm where limited and controlled errors during computation are tolerated. Thanks to approximation, circuits can be faster, more compact, and consume less power. Security aspects of these circuits are however largely unexplored.
Regazzoni, F., Polian, I.
openaire +3 more sources
TinyPower: Side-Channel Attacks with Tiny Neural Networks
IEEE International Symposium on Hardware Oriented Security and TrustSide-channel attacks leverage correlations between power consumption and intermediate encryption results to infer encryption keys. Recent studies show that deep learning offers promising results in the context of side-channel attacks.
Haipeng Li +3 more
semanticscholar +1 more source
Electromagnetic side-channel attacks
Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018Digital forensics is fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are often hampered by the data contained on these devices being encrypted.
Asanka Sayakkara +2 more
openaire +1 more source

