Side Channel Leakages Against Financial IC Card of the Republic of Korea
Integrated circuit (IC) chip cards are commonly used in payment system applications since they can provide security and convenience simultaneously. More precisely, Europay, MasterCard, and VISA (EMV) are widely known to be well equipped with security ...
Yoo-Seung Won +2 more
doaj +1 more source
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world.
Conti, Mauro +3 more
core +1 more source
Regularizers to the Rescue: Fighting Overfitting in DeepLearning-based Side-channel Analysis [PDF]
Azade Rezaeezade, Lejla Batina
openalex +1 more source
Investment Cost Channel and Monetary Transmission [PDF]
We show that a standard DSGE model with investment cost channels has important model stability and policy implications. Our analysis suggests that in economies characterized by supply side well as demand side channels of monetary transmission ...
Henrique S. Basso +2 more
core
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis
Using information-theoretic tools, this paper establishes a mathematical link between the probability of success of a side-channel attack and the minimum number of queries to reach a given success rate, valid for any possible distinguishing rule and with
Éloi de Chérisey +3 more
semanticscholar +1 more source
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software
Software solutions to address computational challenges are ubiquitous in our daily lives. One specific application area where software is often used is in embedded systems, which, like other digital electronic devices, are vulnerable to side-channel ...
Jannik Zeitschner, Amir Moradi
doaj +1 more source
Quantitative approaches to linguistic variation in IRC : implications for qualitative research [PDF]
Qualitative analysis of code choice, code switching, and language style in Internet Relay Chat (IRC) can shed light on functional-pragmatic aspects of the use of different linguistic varieties.
Siebenhaar, Beat
core
MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V [PDF]
Jan Wichelmann +4 more
openalex +1 more source
Polynomial Evaluation and Side Channel Analysis [PDF]
Side Channel Analysis (SCA) is a class of attacks that exploits leakage of information from a cryptographic implementation during execution. To thwart it, masking is a common countermeasure. The principle is to randomly split every sensitive intermediate variable occurring in the computation into several shares and the number of shares, called the ...
Carlet, Claude, Prouff, Emmanuel
openaire +3 more sources
On the Effective Capacity of Two-Hop Communication Systems [PDF]
In this paper, two-hop communication between a source and a destination with the aid of an intermediate relay node is considered. Both the source and intermediate relay node are assumed to operate under statistical quality of service (QoS) constraints ...
Gursoy, Mustafa Cenk +2 more
core +2 more sources

