Results 241 to 250 of about 212,817 (301)
Some of the next articles are maybe not open access.

Electromagnetic side-channel attacks

Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018
Digital forensics is fast-growing field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are often hampered by the data contained on these devices being encrypted.
Asanka Sayakkara   +2 more
openaire   +1 more source

Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES

International Symposium on Smart Electronic Systems, 2020
The majority of recently demonstrated deep-learning side-channel attacks use a single neural network classifier to recover the key. The potential benefits of combining multiple classifiers with ensemble learning method have not been fully explored in the
Huanyu Wang, E. Dubrova
semanticscholar   +1 more source

Thwarting side-channel attacks

Communications of the ACM, 2020
Deep learning challenges chip security.
openaire   +1 more source

Deep Learning Side-Channel Attack Against Hardware Implementations of AES

Euromicro Symposium on Digital Systems Design, 2019
In the field of image recognition, machine learning technologies, especially deep learning, have been rapidly advancing alongside with the advances of hardware such as GPUs. In image recognition, in general, large numbers of labeled sets containing image
Takaya Kubota   +3 more
semanticscholar   +1 more source

Side Channel Attacks on GPUs

IEEE Transactions on Dependable and Secure Computing, 2020
Graphics Processing Units (GPUs) are commonly integrated with computing devices to enhance the performance and capabilities of graphical workloads. In addition, they are increasingly being integrated in data centers and clouds such that they can be used to accelerate data intensive workloads.
Hoda Naghibijouybari   +3 more
openaire   +1 more source

Improved Power/EM Side-Channel Attack Resistance of 128-Bit AES Engines With Random Fast Voltage Dithering

IEEE Journal of Solid-State Circuits, 2019
This paper demonstrates the improved power and electromagnetic (EM) side-channel attack (SCA) resistance of 128-bit Advanced Encryption Standard (AES) engines in 130-nm CMOS using random fast voltage dithering (RFVD) enabled by integrated voltage ...
Arvind Singh   +5 more
semanticscholar   +1 more source

Timing and Side Channel Attacks

2015
How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area.
Resh Amit, Zaidenberg Nezer
openaire   +2 more sources

Mitigating Electromagnetic Side-Channel Attacks

Advances in Multidisciplinary and scientific Research Journal Publication, 2022
By providing new sources of electronic evidence, the Internet of Things (IoT) has opened up new possibilities for digital forensics. Obtaining electronic data from IoT, on the other hand, is a difficult process for a variety of reasons, including the use of various types of standard interfaces, the use of light-weight data encryption, such as elliptic ...
openaire   +1 more source

Karna: A Gate-Sizing based Security Aware EDA Flow for Improved Power Side-Channel Attack Protection

2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2019
Power side-channel attacks pose a serious threat to the security of embedded devices. Most available countermeasures have significant overheads resulting in the application not meeting its requirements of low-power, high-performance and small area.
Patanjali Slpsk   +3 more
semanticscholar   +1 more source

Impact of Side Channel Attack in Information Security

2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), 2019
Side channel attacks are such attacks that are being carried out on the application devices of a cryptosystem. A cryptosystem consists three algorithms as one for key generation, second for encryption and third for decryption purpose.
Himanshu Gupta   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy