Results 311 to 320 of about 2,326,402 (364)
Some of the next articles are maybe not open access.
Federated Learning in Side-Channel Analysis
2021Recently introduced federated learning is an attractive framework for the distributed training of deep learning models with thousands of participants. However, it can potentially be used with malicious intent. For example, adversaries can use their smartphones to jointly train a classifier for extracting secret keys from the smartphones’ SIM cards ...
Huanyu Wang, Elena Dubrova
openaire +2 more sources
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis
IEEE Transactions on Emerging Topics in ComputingToday, the deep learning-based side-channel analysis represents a widely researched topic, with numerous results indicating the advantages of such an approach.
Lichao Wu, Guilherme Perin, S. Picek
semanticscholar +1 more source
An overview of side channel analysis attacks
Proceedings of the 2008 ACM symposium on Information, computer and communications security, 2008During the last ten years, power analysis attacks have been widely developed under many forms. They analyze the relation between the power consumption or electromagnetic radiation of a cryptographic device and the handled data during cryptographic operations.
Thanh-Ha Le+2 more
openaire +2 more sources
Side-Channel Analysis of Keymill
2017One prominent countermeasure against side-channel attacks, especially differential power analysis (DPA), is fresh re-keying. In such schemes, the so-called re-keying function takes the burden of protecting a cryptographic primitive against DPA. To ensure the security of the scheme against side-channel analysis, the re-keying function has to withstand ...
Thomas Korak+3 more
openaire +2 more sources
Side-Channel Analysis of MAC-Keccak
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for crypto-graphic hashing. In this paper, we present a comprehensive Side-Channel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm.
Patrick Schaumont, Mostafa Taha
openaire +2 more sources
Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis
Design, Automation and Test in Europe, 2020Side-channel analysis is widely used for hardware Trojan detection in integrated circuits by analyzing various side-channel signatures, such as timing, power and path delay. Existing delay-based side-channel analysis techniques have two major bottlenecks:
Yangdi Lyu, P. Mishra
semanticscholar +1 more source
Timing side channels for traffic analysis
2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013Traffic analysis often requires direct observations of network connections at local vantage points. In this work, we show that traffic analysis can be performed remotely by taking advantage of a timing side channel. The timing side channel results from a shared resource, namely, the scheduler between two users.
Negar Kiyavash, Xun Gong
openaire +2 more sources
Deep Learning on Side-Channel Analysis
2022Item does not contain ...
Krček, M.+6 more
openaire +2 more sources
Side channel analysis on android smartphones
2016 24th Signal Processing and Communication Application Conference (SIU), 2016In recent years, smartphones have become inseparable components of people's daily life. However, the great popularity of smartphones causes some security problems. For example, users may store their contact lists, passwords and other credentials in their smartphones.
Emin Anarim+3 more
openaire +2 more sources
Test Generation using Reinforcement Learning for Delay-based Side-Channel Analysis
2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2020Reliability and trustworthiness are dominant factors in designing System-on-Chips (SoCs) for a variety of applications. Malicious implants, such as hardware Trojans, can lead to undesired information leakage or system malfunction.
Zhixin Pan, Jennifer Sheldon, P. Mishra
semanticscholar +1 more source