Results 41 to 50 of about 231,688 (280)

Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography

open access: yesInternational Journal of Reconfigurable Computing, 2012
Side channel and fault injection attacks are major threats to cryptographic applications of embedded systems. Best performances for these attacks are achieved by focusing sensors or injectors on the sensible parts of the application, by means of ...
Laurent Sauvage   +4 more
doaj   +1 more source

CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
With virtualized Field Programmable Gate Arrays (FPGAs) on the verge of being deployed to the cloud computing domain, there is a rising interest in resolving recently identified security issues.
Jonas Krautter   +2 more
doaj   +1 more source

UCloD: Small Clock Delays to Mitigate Remote Power Analysis Attacks

open access: yesIEEE Access, 2021
This paper presents UCloD, a novel random clock delay-based robust and scalable countermeasure against recently discovered remote power analysis (RPA) attacks.
Darshana Jayasinghe   +2 more
doaj   +1 more source

DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization

open access: yes, 2019
Recent research has demonstrated that Intel's SGX is vulnerable to software-based side-channel attacks. In a common attack, the adversary monitors CPU caches to infer secret-dependent data accesses patterns. Known defenses have major limitations, as they
Brasser, Ferdinand   +5 more
core   +1 more source

Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography [PDF]

open access: yes, 2015
Article published in the proceedings of the C2SI conference, May 2015.Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols.
El Mrabet, Nadia, Fouotsa, Emmanuel
core   +3 more sources

A Decade in Software-Based Side and Covert Channel Attacks and Countermeasures: A Survey

open access: yesIEEE Access
As technology continues to evolve, it provides significant benefits, such as seamless access to information, while also introducing critical security challenges, including privacy vulnerabilities and the rapid spread of misinformation. One major class of
Teodora Vasilas, Remus Brad
doaj   +1 more source

Survey of side channel attack on encrypted network traffic

open access: yes网络与信息安全学报, 2021
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
Ding LI, Yuefei ZHU, Bin LU, Wei LIN
doaj   +3 more sources

AES Side-Channel Countermeasure using Random Tower Field Constructions [PDF]

open access: yes, 2012
International audienceMasking schemes to secure AES implementations against side-channel attacks is a topic of ongoing research. The most sensitive part of the AES is the non-linear SubBytes operation, in particular, the inversion in GF(2^8), the Galois ...
Bonnecaze, Alexis   +2 more
core   +3 more sources

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

High Order Side-Channel Security for Elliptic-Curve Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Elliptic-curve implementations protected with state-of-the-art countermeasures against side-channel attacks might still be vulnerable to advanced attacks that recover secret information from a single leakage trace.
Sonia Belaïd, Matthieu Rivain
doaj   +1 more source

Home - About - Disclaimer - Privacy