Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography
Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of ...
Laurent Sauvage +4 more
doaj +1 more source
CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design
With virtualized Field Programmable Gate Arrays (FPGAs) on the verge of being deployed to the cloud computing domain, there is a rising interest in resolving recently identified security issues.
Jonas Krautter +2 more
doaj +1 more source
UCloD: Small Clock Delays to Mitigate Remote Power Analysis Attacks
This paper presents UCloD, a novel random clock delay-based robust and scalable countermeasure against recently discovered remote power analysis (RPA) attacks.
Darshana Jayasinghe +2 more
doaj +1 more source
DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-channel attacks. In a common attack, the adversary monitors CPU caches to infer secret-dependent data accesses patterns. Known defenses have major limitations, as they
Brasser, Ferdinand +5 more
core +1 more source
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography [PDF]
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols.
El Mrabet, Nadia, Fouotsa, Emmanuel
core +3 more sources
A Decade in Software-Based Side and Covert Channel Attacks and Countermeasures: A Survey
As technology continues to evolve, it provides significant benefits, such as seamless access to information, while also introducing critical security challenges, including privacy vulnerabilities and the rapid spread of misinformation. One major class of
Teodora Vasilas, Remus Brad
doaj +1 more source
Survey of side channel attack on encrypted network traffic
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
Ding LI, Yuefei ZHU, Bin LU, Wei LIN
doaj +3 more sources
AES Side-Channel Countermeasure using Random Tower Field Constructions [PDF]
International audienceMasking schemes to secure AES implementations against side-channel attacks is a topic of ongoing research. The most sensitive part of the AES is the non-linear SubBytes operation, in particular, the inversion in GF(2^8), the Galois ...
Bonnecaze, Alexis +2 more
core +3 more sources
In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka +11 more
wiley +1 more source
High Order Side-Channel Security for Elliptic-Curve Implementations
Elliptic-curve implementations protected with state-of-the-art countermeasures against side-channel attacks might still be vulnerable to advanced attacks that recover secret information from a single leakage trace.
Sonia Belaïd, Matthieu Rivain
doaj +1 more source

