Results 201 to 210 of about 2,490,029 (269)
Some of the next articles are maybe not open access.

Side Channel Analysis: A Novel Intrusion Detection System Based on Vehicle Voltage Signals

IEEE Transactions on Vehicular Technology, 2023
Intelligent connected vehicles (ICVs) integrate advanced equipment and communication network technologies to realize information exchange and sharing between vehicles and people, roads, clouds, etc., bringing great convenience to people's lives. However,
Yijie Xun   +3 more
semanticscholar   +1 more source

Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis

IEEE Transactions on Information Forensics and Security, 2021
Deep Neural Network (DNN) models have been extensively developed by companies for a wide range of applications. The development of a customized DNN model with great performance requires costly investments, and its structure (layers and hyper-parameters ...
Yicheng Zhang   +4 more
semanticscholar   +1 more source

A Review and Comparison of AI-enhanced Side Channel Analysis

ACM Journal on Emerging Technologies in Computing Systems, 2022
Side Channel Analysis (SCA) presents a clear threat to privacy and security in modern computing systems. The vast majority of communications are secured through cryptographic algorithms.
Max Panoff, H. Yu, Haoqi Shan, Yier Jin
semanticscholar   +1 more source

Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations

Euromicro Symposium on Digital Systems Design, 2022
In the ongoing last round of NIST's post-quantum cryptography standardization competition, side-channel analysis of finalists is a main focus of attention. While their resistance to timing, power and near field electromagnetic (EM) side-channels has been
Ruize Wang, Kalle Ngo, E. Dubrova
semanticscholar   +1 more source

XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses

IEEE Transactions on Dependable and Secure Computing, 2022
Website Fingerprinting attacks aim to track the visited websites in browsers and infer confidential information about users. Several studies showed that recent advancements in Machine Learning (ML) and Deep Learning (DL) algorithms made it possible to ...
Berk Gulmezoglu
semanticscholar   +1 more source

Counteract Side-Channel Analysis of Neural Networks by Shuffling

Design, Automation and Test in Europe, 2022
Machine learning is becoming an essential part in almost every electronic device. Implementations of neural networks are mostly targeted towards computational performance or memory footprint.
Manuel Brosch, Matthias Probst, G. Sigl
semanticscholar   +1 more source

Side channel analysis of SPECK

Journal of Computer Security, 2020
SPECK is a family of lightweight block ciphers developed by Beaulieu et al. of the US National Security Agency (NSA) for the Internet of Things (IoT). It is an ARX-based design with a Feistel-like structure which supports keys of size ranging from 64 bits to 256 bits.
Joseph, Mabin   +2 more
openaire   +1 more source

Side Channel Analysis Resistant Design Flow

2006 IEEE International Symposium on Circuits and Systems, 2006
The threat of side-channel attacks (SCA) is of crucial importance when designing systems with cryptographic hardware or software. The FP6-funded project SCARD enhances the typical micro-chip design flow in order to provide a means for designing side-channel resistant circuits and systems.
Aigner, M   +7 more
openaire   +2 more sources

I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis

IEEE Transactions on Emerging Topics in Computing
Today, the deep learning-based side-channel analysis represents a widely researched topic, with numerous results indicating the advantages of such an approach.
Lichao Wu, Guilherme Perin, S. Picek
semanticscholar   +1 more source

Side-Channel Analysis of Keymill

2017
One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to withstand ...
Christoph Dobraunig   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy