Results 31 to 40 of about 399,159 (347)
SonarSnoop: active acoustic side-channel attacks [PDF]
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.
Peng Cheng +3 more
openaire +5 more sources
Special Issue on “Side Channel Attacks”
Cryptosystems are widely used in a growing number of embedded applications, such as smart cards, smart phones, Internet of Things (IoT) devices, and so on [...]
Seokhie Hong
doaj +1 more source
Physical functions : the common factor of side-channel and fault attacks ? [PDF]
International audienceSecurity is a key component for information technologies and communication. Among the security threats, a very important one is certainly due to vulnerabilities of the integrated circuits that implement cryptographic algorithms ...
Le Bouder, Hélène, Robisson, Bruno
core +5 more sources
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs
In this work, we demonstrate generic and practical EM side-channel assisted chosen ciphertext attacks over multiple LWE/LWR-based Public Key Encryption (PKE) and Key Encapsulation Mechanisms (KEM) secure in the chosen ciphertext model (IND-CCA security).
P. Ravi +3 more
semanticscholar +1 more source
The Best of Two Worlds: Deep Learning-assisted Template Attack
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu +2 more
doaj +1 more source
Are Timing-Based Side-Channel Attacks Feasible in Shared, Modern Computing Hardware? [PDF]
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount attacks against the users of such hardware. Microarchitectural Attacks, the result of these vulnerabilities, take advantage of Microarchitectural performance ...
A.Clements +58 more
core +2 more sources
Privacy protection is an essential part of information security. The use of shared resources demands more privacy and security protection, especially in cloud computing environments.
Chao Su, Qingkai Zeng
semanticscholar +1 more source
Runtime Randomized Relocation of Crypto Libraries for Mitigating Cache Attacks
Crypto libraries such as OpenSSL and Libgcrypt are essential building blocks for implementing secure cloud services. Unfortunately, these libraries are subject to cache side-channel attacks, which are more devastating in cloud environments where ...
Youngjoo Shin, Joobeom Yun
doaj +1 more source
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It [PDF]
Cache randomization has recently been revived as a promising defense against conflict-based cache side-channel attacks. As two of the latest implementations, CEASER-S and ScatterCache both claim to thwart conflict-based cache side-channel attacks using ...
Wei Song +5 more
semanticscholar +1 more source

