Results 311 to 320 of about 2,326,402 (364)
Some of the next articles are maybe not open access.

Federated Learning in Side-Channel Analysis

2021
Recently introduced federated learning is an attractive framework for the distributed training of deep learning models with thousands of participants. However, it can potentially be used with malicious intent. For example, adversaries can use their smartphones to jointly train a classifier for extracting secret keys from the smartphones’ SIM cards ...
Huanyu Wang, Elena Dubrova
openaire   +2 more sources

I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis

IEEE Transactions on Emerging Topics in Computing
Today, the deep learning-based side-channel analysis represents a widely researched topic, with numerous results indicating the advantages of such an approach.
Lichao Wu, Guilherme Perin, S. Picek
semanticscholar   +1 more source

An overview of side channel analysis attacks

Proceedings of the 2008 ACM symposium on Information, computer and communications security, 2008
During the last ten years, power analysis attacks have been widely developed under many forms. They analyze the relation between the power consumption or electromagnetic radiation of a cryptographic device and the handled data during cryptographic operations.
Thanh-Ha Le   +2 more
openaire   +2 more sources

Side-Channel Analysis of Keymill

2017
One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to withstand ...
Thomas Korak   +3 more
openaire   +2 more sources

Side-Channel Analysis of MAC-Keccak

2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013
NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for crypto-graphic hashing. In this paper, we present a comprehensive Side-Channel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm.
Patrick Schaumont, Mostafa Taha
openaire   +2 more sources

Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis

Design, Automation and Test in Europe, 2020
Side-channel analysis is widely used for hardware Trojan detection in integrated circuits by analyzing various side-channel signatures, such as timing, power and path delay. Existing delay-based side-channel analysis techniques have two major bottlenecks:
Yangdi Lyu, P. Mishra
semanticscholar   +1 more source

Timing side channels for traffic analysis

2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013
Traffic analysis often requires direct observations of network connections at local vantage points. In this work, we show that traffic analysis can be performed remotely by taking advantage of a timing side channel. The timing side channel results from a shared resource, namely, the scheduler between two users.
Negar Kiyavash, Xun Gong
openaire   +2 more sources

Deep Learning on Side-Channel Analysis

2022
Item does not contain ...
Krček, M.   +6 more
openaire   +2 more sources

Side channel analysis on android smartphones

2016 24th Signal Processing and Communication Application Conference (SIU), 2016
In recent years, smartphones have become inseparable components of people's daily life. However, the great popularity of smartphones causes some security problems. For example, users may store their contact lists, passwords and other credentials in their smartphones.
Emin Anarim   +3 more
openaire   +2 more sources

Test Generation using Reinforcement Learning for Delay-based Side-Channel Analysis

2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2020
Reliability and trustworthiness are dominant factors in designing System-on-Chips (SoCs) for a variety of applications. Malicious implants, such as hardware Trojans, can lead to undesired information leakage or system malfunction.
Zhixin Pan, Jennifer Sheldon, P. Mishra
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy