Results 11 to 20 of about 1,857,403 (288)
Analisis Ikonologi Iklan Billboard Go-Pay di Yogyakarta
Penelitian ini berjuan untuk mengetahui bagaimana analisis Ikonologi iklan billboard Go-Pay di Yogyakarta. Dalam penelitian ini penulis memakai metode penelitian Deskriptif Kualitatif.
Dinda Destiana Fahma Ayu
doaj +1 more source
Exploring Cortex-M Microarchitectural Side Channel Information Leakage
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge
Alessandro Barenghi +3 more
doaj +1 more source
High-Throughput Cross-Technology Communication via Chip-Level Side Channel
Cross-technology Communication (CTC) is a novel technique enabling data transmission among devices equipped with different physical layers in a heterogeneous wireless network.
Cheng Feng, Tian Xia
doaj +1 more source
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz +4 more
doaj +1 more source
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Muhammad Yasin +2 more
+6 more sources
Toward Exposing Timing-Based Probing Attacks in Web Applications
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web
Jian Mao +4 more
doaj +1 more source
Side-channel analysis in frequency domain with clustering
The alignment of power traces is one of the key factors affecting the success of side-channel analysis. Frequency-domain side-channel analysis can effectively solve the alignment of power traces in the time domain.
Cai Juesong +3 more
doaj +1 more source
Side-Channel Evaluation Methodology on Software
Cryptographic implementations need to be robust amidst the widespread use of crypto-libraries and attacks targeting their implementation, such as side-channel attacks (SCA).
Sylvain Guilley +5 more
doaj +1 more source
Risky Translations: Securing TLBs against Timing Side Channels
Microarchitectural side-channel vulnerabilities in modern processors are known to be a powerful attack vector that can be utilized to bypass common security boundaries like memory isolation.
Florian Stolz +3 more
doaj +1 more source
Control of flow in the side outflow channel [PDF]
The article discusses the task of regulating the flow in the channel with a lateral outflow. A form of retraction channel is recommended to ensure a smooth flow. Solving the issues with water distribution along the channel route and determining the shape
Babajanova Iroda +4 more
doaj +1 more source

