Results 231 to 240 of about 212,817 (301)
Some of the next articles are maybe not open access.

Design and Implementation of Side Channel Attack Based on Deep Learning LSTM

2023 IEEE Region 10 Symposium (TENSYMP), 2023
Encryption algorithms and encryption devices both play a key role in ensuring the safety of data that has been encrypted. Various types of attacks, such as energy analysis, can be used to assess the reliability of the encryption devices.
A. A. Ahmed, M Zahid Hasan
semanticscholar   +1 more source

MeshUp: Stateless Cache Side-channel Attack on CPU Mesh

IEEE Symposium on Security and Privacy, 2022
Cache side-channel attacks lead to severe security threats to the settings where a CPU is shared across users, e.g., in the cloud. The majority of attacks rely on sensing the micro-architectural state changes made by victims, but this assumption can be ...
Junpeng Wan   +3 more
semanticscholar   +1 more source

VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets

IEEE Conference on Virtual Reality and 3D User Interfaces, 2021
In Virtual Reality (VR), users typically interact with the virtual world using virtual keyboard to insert keywords, surfing the webpages, or typing passwords to access online accounts.
Abdullah Al Arafat   +2 more
semanticscholar   +1 more source

Multilabel Deep Learning-Based Side-Channel Attack

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
In recent years, deep learning methods make a big difference in side-channel attack (SCA) community especially in the profiled scenario. Multiclass classification method is the common way to complete such classification task.
Libang Zhang   +4 more
semanticscholar   +1 more source

Far Field EM Side-Channel Attack on AES Using Deep Learning

IACR Cryptology ePrint Archive, 2020
We present the first deep learning-based side-channel attack on AES-128 using far field electromagnetic emissions as a side channel. Our neural networks are trained on traces captured from five different Bluetooth devices at five different distances to ...
Ruize Wang, Huanyu Wang, E. Dubrova
semanticscholar   +1 more source

BranchScope: A New Side-Channel Attack on Directional Branch Predictor

International Conference on Architectural Support for Programming Languages and Operating Systems, 2018
We present BranchScope - a new side-channel attack where the attacker infers the direction of an arbitrary conditional branch instruction in a victim program by manipulating the shared directional branch predictor. The directional component of the branch
Dmitry Evtyushkin   +3 more
semanticscholar   +1 more source

Side-Channel Attack Pitfalls

2007 44th ACM/IEEE Design Automation Conference, 2007
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel attacks. Without expensive equipment or intrusive monitoring, these attacks bypass the mathematical complexity and find the cryptographic key by observing the power consumption ...
openaire   +1 more source

Side Channel Attacks vs Approximate Computing

Proceedings of the 2020 on Great Lakes Symposium on VLSI, 2020
Approximate computing is an architectural paradigm where limited and controlled errors during computation are tolerated. Thanks to approximation, circuits can be faster, more compact, and consume less power. Security aspects of these circuits are however largely unexplored.
Regazzoni, F., Polian, I.
openaire   +3 more sources

MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment

IEEE Transactions on Industrial Informatics, 2020
As an emerging technology, industrial Internet of Things (IIoT) connects massive sensors and actuators to empower industrial sectors being smart, autonomous, efficient, and safety.
Dajiang Chen   +6 more
semanticscholar   +1 more source

Power Side Channel Attack Analysis and Detection

2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2020
Side Channel Attack (SCA) is a serious threat to the hardware implementation of cryptographic protocols. Various side channels such as, power, timing, electromagnetic emission and acoustic noise have been explored to extract the secret keys.
Navyata Gattu   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy