Results 11 to 20 of about 348,356 (277)

ThermalAttackNet: Are CNNs Making It Easy to Perform Temperature Side-Channel Attack in Mobile Edge Devices?

open access: yesFuture Internet, 2021
Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation ...
Somdip Dey   +2 more
doaj   +3 more sources

Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures

open access: yesICT Express, 2021
Although quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attack on
Dongjun Park   +5 more
doaj   +3 more sources

Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor

open access: yesApplied Sciences, 2020
Cache side channel attacks extract secret information by monitoring the cache behavior of a victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim.
Jonghyeon Cho   +5 more
doaj   +3 more sources

Deep Learning-based Side Channel Attack on HMAC SM3.

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2020
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC.
Xin Jin   +3 more
doaj   +1 more source

Algebraic Side Channel Attack Against EPCBC Based on Hamming Weight [PDF]

open access: yesJisuanji gongcheng, 2017
In order to assess the security of EPCBC cipher,this paper proposes an algebraic side channel attack method based on Hamming weight,and studies factors which affect the attack efficiency.The algebraic equations of the algorithm are constructed.The power ...
LING Hang,WU Zhen,DU Zhibo,WANG Min,RAO Jintao
doaj   +1 more source

JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos   +3 more
doaj   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Malware Guard Extension: abusing Intel SGX to conceal cache attacks

open access: yesCybersecurity, 2020
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz   +4 more
doaj   +1 more source

Application of Neural Networks to Power Analysis

open access: yesEngineering Proceedings, 2023
The purpose of this work is to research the possibility of a side-channel attack, more precisely power consumption attack (recovering the encryption key according to the board’s power consumption schedule) on the AES-128 algorithm implemented in hardware.
Alla Levina, Roman Bolozovskii
doaj   +1 more source

Home - About - Disclaimer - Privacy