Results 231 to 240 of about 212,817 (301)
Some of the next articles are maybe not open access.
Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
2023 IEEE Region 10 Symposium (TENSYMP), 2023Encryption algorithms and encryption devices both play a key role in ensuring the safety of data that has been encrypted. Various types of attacks, such as energy analysis, can be used to assess the reliability of the encryption devices.
A. A. Ahmed, M Zahid Hasan
semanticscholar +1 more source
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh
IEEE Symposium on Security and Privacy, 2022Cache side-channel attacks lead to severe security threats to the settings where a CPU is shared across users, e.g., in the cloud. The majority of attacks rely on sensing the micro-architectural state changes made by victims, but this assumption can be ...
Junpeng Wan +3 more
semanticscholar +1 more source
VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets
IEEE Conference on Virtual Reality and 3D User Interfaces, 2021In Virtual Reality (VR), users typically interact with the virtual world using virtual keyboard to insert keywords, surfing the webpages, or typing passwords to access online accounts.
Abdullah Al Arafat +2 more
semanticscholar +1 more source
Multilabel Deep Learning-Based Side-Channel Attack
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021In recent years, deep learning methods make a big difference in side-channel attack (SCA) community especially in the profiled scenario. Multiclass classification method is the common way to complete such classification task.
Libang Zhang +4 more
semanticscholar +1 more source
Far Field EM Side-Channel Attack on AES Using Deep Learning
IACR Cryptology ePrint Archive, 2020We present the first deep learning-based side-channel attack on AES-128 using far field electromagnetic emissions as a side channel. Our neural networks are trained on traces captured from five different Bluetooth devices at five different distances to ...
Ruize Wang, Huanyu Wang, E. Dubrova
semanticscholar +1 more source
BranchScope: A New Side-Channel Attack on Directional Branch Predictor
International Conference on Architectural Support for Programming Languages and Operating Systems, 2018We present BranchScope - a new side-channel attack where the attacker infers the direction of an arbitrary conditional branch instruction in a victim program by manipulating the shared directional branch predictor. The directional component of the branch
Dmitry Evtyushkin +3 more
semanticscholar +1 more source
2007 44th ACM/IEEE Design Automation Conference, 2007
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire +1 more source
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire +1 more source
Side Channel Attacks vs Approximate Computing
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 2020Approximate computing is an architectural paradigm where limited and controlled errors during computation are tolerated. Thanks to approximation, circuits can be faster, more compact, and consume less power. Security aspects of these circuits are however largely unexplored.
Regazzoni, F., Polian, I.
openaire +3 more sources
IEEE Transactions on Industrial Informatics, 2020
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors and actuators to empower industrial sectors being smart, autonomous, efficient, and safety.
Dajiang Chen +6 more
semanticscholar +1 more source
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors and actuators to empower industrial sectors being smart, autonomous, efficient, and safety.
Dajiang Chen +6 more
semanticscholar +1 more source
Power Side Channel Attack Analysis and Detection
2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2020Side Channel Attack (SCA) is a serious threat to the hardware implementation of cryptographic protocols. Various side channels such as, power, timing, electromagnetic emission and acoustic noise have been explored to extract the secret keys.
Navyata Gattu +3 more
semanticscholar +1 more source

