Results 11 to 20 of about 336,639 (325)
Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj +1 more source
Survey of side channel attack on encrypted network traffic
By analyzing and extracting information such as packet size and timing leaked during Web application communication, side channel attack on encrypted network traffic is able to recognize users' identity and behavior and even restore the original data ...
Ding LI, Yuefei ZHU, Bin LU, Wei LIN
doaj +3 more sources
Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation ...
Somdip Dey+2 more
doaj +1 more source
Key‐dependent side‐channel cube attack on CRAFT
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side‐channel cube attacks.
Kok‐An Pang+1 more
doaj +1 more source
Kangaroos in Side-Channel Attacks [PDF]
Side-channel attacks are a powerful tool to discover the cryptographic secrets of a chip or other device but only too often do they require too many traces or leave too many possible keys to explore. In this paper we show that for side channel attacks on discrete-logarithm-based systems significantly more unknown bits can be handled by using Pollard's ...
Tanja Lange+2 more
openaire +4 more sources
Analysis of the algebraic side channel attack [PDF]
At CHES 2009, Renauld, Standaert and Veyrat-Charvillon introduced a new kind of attack called Algebraic Side-Channel Attacks (ASCA). They showed that side-channel information leads to effective algebraic attacks. These results are mostly experiments strongly based on a the use of a SAT-solver.
Jean-Charles Faugère+4 more
openaire +4 more sources
JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos+3 more
doaj +1 more source
Application of Neural Networks to Power Analysis
The purpose of this work is to research the possibility of a side-channel attack, more precisely power consumption attack (recovering the encryption key according to the board’s power consumption schedule) on the AES-128 algorithm implemented in hardware.
Alla Levina, Roman Bolozovskii
doaj +1 more source
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley+16 more
core +2 more sources
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz+4 more
doaj +1 more source