Results 1 to 10 of about 349,795 (327)
Smartphone barometer can hear, and sense finger taps [PDF]
Nearly all modern smartphones are now equipped with a barometer to sample air pressure. Accessing these samples is deemed harmless, hence does not require permission.
Alireza Hafez +2 more
doaj +2 more sources
Side-Channel Attack on ARADI in Non-Profiling Scenarios
ARADI is a low-latency block cipher introduced by the NSA (National Security Agency), designed with consideration for applications in memory encryption.
Donggeun Kwon, Seokhie Hong
doaj +2 more sources
Dynamic S-Boxes Block Cipher for Side-Channel Attack Resistance
Side-channel attacks constitute a critical security threat to hardware implementations of block ciphers. Traditional countermeasures, such as masking, aim to obscure the correlation between a device’s power consumption and its internal ...
Phuc-Phan Duong +4 more
doaj +2 more sources
Efficient AES Side-Channel Attacks Based on Residual Mamba Enhanced CNN [PDF]
With the continuous advancement of side-channel attacks (SCA), deep learning-based methods have emerged as a prominent research focus due to their powerful feature extraction and nonlinear modeling capabilities. Traditional convolutional neural networks (
Zhaobin Li, Chenchong Du, Xiaoyi Duan
doaj +2 more sources
Deep Learning Side-Channel Collision Attack
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj +1 more source
ThermalBleed: A Practical Thermal Side-Channel Attack
Modern OSs expose an interface for monitoring CPU temperature to unprivileged users for effective user decision-based thermal management. Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction of ...
Taehun Kim, Youngjoo Shin
doaj +1 more source
Side Channel Analysis Attack Based on Deep Learning LSTM [PDF]
The security of encrypted data is affected by encryption algorithms and encryption devices.The reliability of the encryption devices can be tested by using multiple types of attacks, such as energy analysis.Among different attack methods, the method of ...
WANG Junnian, ZHU Bin, YU Wenxin, WANG Wan, HU Fanliang
doaj +1 more source
Deep Learning-based Side Channel Attack on HMAC SM3
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin +3 more
doaj +1 more source
The Best of Two Worlds: Deep Learning-assisted Template Attack
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu +2 more
doaj +1 more source
Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj +1 more source

