Results 301 to 310 of about 2,326,402 (364)

Insights from aquaporin structures into drug-resistant sleeping sickness

open access: yes
Matusevicius M   +22 more
europepmc   +1 more source

Abacus: Precise Side-Channel Analysis

2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021
Side-channel attacks allow adversaries to infer sensitive information from non-functional characteristics. Prior side-channel detection work is able to identify numerous potential vulnerabilities.
Qinkun Bao   +4 more
semanticscholar   +3 more sources

A Review and Comparison of AI-enhanced Side Channel Analysis

ACM Journal on Emerging Technologies in Computing Systems, 2022
Side Channel Analysis (SCA) presents a clear threat to privacy and security in modern computing systems. The vast majority of communications are secured through cryptographic algorithms.
Max Panoff, H. Yu, Haoqi Shan, Yier Jin
semanticscholar   +1 more source

XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses

IEEE Transactions on Dependable and Secure Computing, 2022
Website Fingerprinting attacks aim to track the visited websites in browsers and infer confidential information about users. Several studies showed that recent advancements in Machine Learning (ML) and Deep Learning (DL) algorithms made it possible to ...
Berk Gulmezoglu
semanticscholar   +1 more source

Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations

Euromicro Symposium on Digital Systems Design, 2022
In the ongoing last round of NIST's post-quantum cryptography standardization competition, side-channel analysis of finalists is a main focus of attention. While their resistance to timing, power and near field electromagnetic (EM) side-channels has been
Ruize Wang, Kalle Ngo, E. Dubrova
semanticscholar   +1 more source

Counteract Side-Channel Analysis of Neural Networks by Shuffling

Design, Automation and Test in Europe, 2022
Machine learning is becoming an essential part in almost every electronic device. Implementations of neural networks are mostly targeted towards computational performance or memory footprint.
Manuel Brosch, Matthias Probst, G. Sigl
semanticscholar   +1 more source

Side channel analysis of SPECK

Journal of Computer Security, 2020
SPECK is a family of lightweight block ciphers developed by Beaulieu et al. of the US National Security Agency (NSA) for the Internet of Things (IoT). It is an ARX-based design with a Feistel-like structure which supports keys of size ranging from 64 bits to 256 bits.
R. Balasubramanian   +3 more
openaire   +2 more sources

Use of Simulators for Side-Channel Analysis

2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2017
Side-channel attacks are among the most powerful and cost-effective attacks on cryptographic systems. Simulators that are developed for side-channel analysis are very useful for preliminary analysis of new schemes, in depth analysis of existing schemes as well as for analysis of products on early stages of development. The contribution of this paper is
Sylvain Guilley, Nikita Veshchikov
openaire   +2 more sources

Side channel analysis of an automotive microprocessor

IET Irish Signals and Systems Conference (ISSC 2008), 2008
Automotive electronics are becoming ever more complex. The quantity and sensitivity of data that is transmitted throughout a car is expected to continue to increase in coming years. On board computers can contain information about the car and dictate how the car behaves.
Hamilton, Mark   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy