Results 11 to 20 of about 212,817 (301)

Side Channel Analysis Attack Based on Deep Learning LSTM [PDF]

open access: yesJisuanji gongcheng, 2021
The security of encrypted data is affected by encryption algorithms and encryption devices.The reliability of the encryption devices can be tested by using multiple types of attacks, such as energy analysis.Among different attack methods, the method of ...
WANG Junnian, ZHU Bin, YU Wenxin, WANG Wan, HU Fanliang
doaj   +1 more source

The Best of Two Worlds: Deep Learning-assisted Template Attack

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In the last decade, machine learning-based side-channel attacks have become a standard option when investigating profiling side-channel attacks. At the same time, the previous state-of-the-art technique, template attack, started losing its importance ...
Lichao Wu   +2 more
doaj   +1 more source

Survey of side channel attack on encrypted network traffic

open access: yes网络与信息安全学报, 2021
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
LI Ding, ZHU Yuefei, LU Bin, LIN Wei
doaj   +3 more sources

Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters

open access: yesIEEE Access, 2023
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj   +1 more source

Key‐dependent side‐channel cube attack on CRAFT

open access: yesETRI Journal, 2021
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang   +1 more
doaj   +1 more source

ThermalAttackNet: Are CNNs Making It Easy to Perform Temperature Side-Channel Attack in Mobile Edge Devices?

open access: yesFuture Internet, 2021
Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation ...
Somdip Dey   +2 more
doaj   +1 more source

There’s Always a Bigger Fish: A Clarifying Analysis of a Machine-Learning-Assisted Side-Channel Attack

open access: yesIEEE Micro, 2022
Machine learning has made it possible to mount powerful attacks through side channels that are otherwise challenging to exploit. However, due to the black-box nature of machine learning models, these attacks can be difficult to interpret correctly ...
Jack Cook   +3 more
semanticscholar   +1 more source

Deep Learning-based Side Channel Attack on HMAC SM3.

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2020
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin   +3 more
doaj   +1 more source

Algebraic Side Channel Attack Against EPCBC Based on Hamming Weight [PDF]

open access: yesJisuanji gongcheng, 2017
In order to assess the security of EPCBC cipher,this paper proposes an algebraic side channel attack method based on Hamming weight,and studies factors which affect the attack efficiency.The algebraic equations of the algorithm are constructed.The power ...
LING Hang,WU Zhen,DU Zhibo,WANG Min,RAO Jintao
doaj   +1 more source

A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM

open access: yesIACR Cryptology ePrint Archive, 2021
In this paper, we present a side-channel attack on a first-order masked implementation of IND-CCA secure Saber KEM. We show how to recover both the session key and the long-term secret key from 24 traces using a deep neural network created at the ...
Kalle Ngo   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy