Results 1 to 10 of about 349,795 (327)

Smartphone barometer can hear, and sense finger taps [PDF]

open access: yesCybersecurity
Nearly all modern smartphones are now equipped with a barometer to sample air pressure. Accessing these samples is deemed harmless, hence does not require permission.
Alireza Hafez   +2 more
doaj   +2 more sources

Side-Channel Attack on ARADI in Non-Profiling Scenarios

open access: goldIEEE Access
ARADI is a low-latency block cipher introduced by the NSA (National Security Agency), designed with consideration for applications in memory encryption.
Donggeun Kwon, Seokhie Hong
doaj   +2 more sources

Dynamic S-Boxes Block Cipher for Side-Channel Attack Resistance

open access: goldIEEE Access
Side-channel attacks constitute a critical security threat to hardware implementations of block ciphers. Traditional countermeasures, such as masking, aim to obscure the correlation between a device’s power consumption and its internal ...
Phuc-Phan Duong   +4 more
doaj   +2 more sources

Efficient AES Side-Channel Attacks Based on Residual Mamba Enhanced CNN [PDF]

open access: yesEntropy
With the continuous advancement of side-channel attacks (SCA), deep learning-based methods have emerged as a prominent research focus due to their powerful feature extraction and nonlinear modeling capabilities. Traditional convolutional neural networks (
Zhaobin Li, Chenchong Du, Xiaoyi Duan
doaj   +2 more sources

Deep Learning Side-Channel Collision Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +1 more source

ThermalBleed: A Practical Thermal Side-Channel Attack

open access: yesIEEE Access, 2022
Modern OSs expose an interface for monitoring CPU temperature to unprivileged users for effective user decision-based thermal management. Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction of ...
Taehun Kim, Youngjoo Shin
doaj   +1 more source

Side Channel Analysis Attack Based on Deep Learning LSTM [PDF]

open access: yesJisuanji gongcheng, 2021
The security of encrypted data is affected by encryption algorithms and encryption devices.The reliability of the encryption devices can be tested by using multiple types of attacks, such as energy analysis.Among different attack methods, the method of ...
WANG Junnian, ZHU Bin, YU Wenxin, WANG Wan, HU Fanliang
doaj   +1 more source

Deep Learning-based Side Channel Attack on HMAC SM3

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2021
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin   +3 more
doaj   +1 more source

The Best of Two Worlds: Deep Learning-assisted Template Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu   +2 more
doaj   +1 more source

Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters

open access: yesIEEE Access, 2023
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj   +1 more source

Home - About - Disclaimer - Privacy