Results 11 to 20 of about 349,795 (327)

Side-Channel Attacks [PDF]

open access: yes, 2019
Apart from the previously mentioned attacks that exploit the algorithmic weaknesses of logic locking techniques, logic locking is also vulnerable to the emerging class of side-channel attacks, which are the focus of this chapter. The chapter introduces four attacks on logic locking that exploit various side-channels to extract secret key.
Muhammad Yasin   +2 more
  +6 more sources

Survey of side channel attack on encrypted network traffic

open access: yes网络与信息安全学报, 2021
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
LI Ding, ZHU Yuefei, LU Bin, LIN Wei
doaj   +3 more sources

ThermalAttackNet: Are CNNs Making It Easy to Perform Temperature Side-Channel Attack in Mobile Edge Devices?

open access: yesFuture Internet, 2021
Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation ...
Somdip Dey   +2 more
doaj   +1 more source

Key‐dependent side‐channel cube attack on CRAFT

open access: yesETRI Journal, 2021
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang   +1 more
doaj   +1 more source

Algebraic Side Channel Attack Against EPCBC Based on Hamming Weight [PDF]

open access: yesJisuanji gongcheng, 2017
In order to assess the security of EPCBC cipher,this paper proposes an algebraic side channel attack method based on Hamming weight,and studies factors which affect the attack efficiency.The algebraic equations of the algorithm are constructed.The power ...
LING Hang,WU Zhen,DU Zhibo,WANG Min,RAO Jintao
doaj   +1 more source

JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos   +3 more
doaj   +1 more source

Application of Neural Networks to Power Analysis

open access: yesEngineering Proceedings, 2023
The purpose of this work is to research the possibility of a side-channel attack, more precisely power consumption attack (recovering the encryption key according to the board’s power consumption schedule) on the AES-128 algorithm implemented in hardware.
Alla Levina, Roman Bolozovskii
doaj   +1 more source

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Malware Guard Extension: abusing Intel SGX to conceal cache attacks

open access: yesCybersecurity, 2020
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz   +4 more
doaj   +1 more source

SonarSnoop: active acoustic side-channel attacks [PDF]

open access: yesInternational Journal of Information Security, 2019
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.
Peng Cheng   +3 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy