Results 11 to 20 of about 1,857,403 (288)

Analisis Ikonologi Iklan Billboard Go-Pay di Yogyakarta

open access: yesAl-Misbah: Jurnal Islamic Studies, 2018
Penelitian ini berjuan untuk mengetahui bagaimana analisis Ikonologi iklan billboard Go-Pay di Yogyakarta. Dalam penelitian ini penulis memakai metode penelitian Deskriptif Kualitatif.
Dinda Destiana Fahma Ayu
doaj   +1 more source

Exploring Cortex-M Microarchitectural Side Channel Information Leakage

open access: yesIEEE Access, 2021
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge
Alessandro Barenghi   +3 more
doaj   +1 more source

High-Throughput Cross-Technology Communication via Chip-Level Side Channel

open access: yesApplied Sciences, 2022
Cross-technology Communication (CTC) is a novel technique enabling data transmission among devices equipped with different physical layers in a heterogeneous wireless network.
Cheng Feng, Tian Xia
doaj   +1 more source

Malware Guard Extension: abusing Intel SGX to conceal cache attacks

open access: yesCybersecurity, 2020
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz   +4 more
doaj   +1 more source

Side-Channel Attacks [PDF]

open access: yes, 2019
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Muhammad Yasin   +2 more
  +6 more sources

Toward Exposing Timing-Based Probing Attacks in Web Applications

open access: yesSensors, 2017
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web
Jian Mao   +4 more
doaj   +1 more source

Side-channel analysis in frequency domain with clustering

open access: yesDianzi Jishu Yingyong, 2021
The alignment of power traces is one of the key factors affecting the success of side-channel analysis. Frequency-domain side-channel analysis can effectively solve the alignment of power traces in the time domain.
Cai Juesong   +3 more
doaj   +1 more source

Side-Channel Evaluation Methodology on Software

open access: yesCryptography, 2020
Cryptographic implementations need to be robust amidst the widespread use of crypto-libraries and attacks targeting their implementation, such as side-channel attacks (SCA).
Sylvain Guilley   +5 more
doaj   +1 more source

Risky Translations: Securing TLBs against Timing Side Channels

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to bypass common security boundaries like memory isolation.
Florian Stolz   +3 more
doaj   +1 more source

Control of flow in the side outflow channel [PDF]

open access: yesE3S Web of Conferences, 2023
The article discusses the task of regulating the flow in the channel with a lateral outflow. A form of retraction channel is recommended to ensure a smooth flow. Solving the issues with water distribution along the channel route and determining the shape
Babajanova Iroda   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy