Results 31 to 40 of about 399,159 (347)

SonarSnoop: active acoustic side-channel attacks [PDF]

open access: yesInternational Journal of Information Security, 2019
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.
Peng Cheng   +3 more
openaire   +5 more sources

Special Issue on “Side Channel Attacks”

open access: yesApplied Sciences, 2019
Cryptosystems are widely used in a growing number of embedded applications, such as smart cards, smart phones, Internet of Things (IoT) devices, and so on [...]
Seokhie Hong
doaj   +1 more source

Physical functions : the common factor of side-channel and fault attacks ? [PDF]

open access: yes, 2014
International audienceSecurity is a key component for information technologies and communication. Among the security threats, a very important one is certainly due to vulnerabilities of the integrated circuits that implement cryptographic algorithms ...
Le Bouder, Hélène, Robisson, Bruno
core   +5 more sources

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
In this work, we demonstrate generic and practical EM side-channel assisted chosen ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key Encapsulation Mechanisms (KEM) secure in the chosen ciphertext model (IND-CCA security).
P. Ravi   +3 more
semanticscholar   +1 more source

The Best of Two Worlds: Deep Learning-assisted Template Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu   +2 more
doaj   +1 more source

Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? [PDF]

open access: yes, 2018
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural Attacks, the result of these vulnerabilities, take advantage of Microarchitectural performance ...
A.Clements   +58 more
core   +2 more sources

Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures

open access: yesSecur. Commun. Networks, 2021
Privacy protection is an essential part of information security. The use of shared resources demands more privacy and security protection, especially in cloud computing environments.
Chao Su, Qingkai Zeng
semanticscholar   +1 more source

Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks

open access: yesIEEE Access, 2021
Crypto libraries such as OpenSSL and Libgcrypt are essential building blocks for implementing secure cloud services. Unfortunately, these libraries are subject to cache side-channel attacks, which are more devastating in cloud environments where ...
Youngjoo Shin, Joobeom Yun
doaj   +1 more source

Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It [PDF]

open access: yesIEEE Symposium on Security and Privacy, 2020
Cache randomization has recently been revived as a promising defense against conflict-based cache side-channel attacks. As two of the latest implementations, CEASER-S and ScatterCache both claim to thwart conflict-based cache side-channel attacks using ...
Wei Song   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy