Results 21 to 30 of about 212,817 (301)

Tandem Deep Learning Side-Channel Attack on FPGA Implementation of AES

open access: yesSN Computer Science, 2021
Side-channel attacks have become a realistic threat to implementations of cryptographic algorithms, especially with the help of deep-learning techniques. The majority of recently demonstrated deep-learning side-channel attacks use a single neural network
Huanyu Wang, E. Dubrova
semanticscholar   +1 more source

JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In safety and security conscious environments, isolated communication channels are often deemed necessary. Galvanically isolated communication channels are typically expected not to allow physical side-channel attacks through that channel.
Kai Schoos   +3 more
doaj   +1 more source

Application of Neural Networks to Power Analysis

open access: yesEngineering Proceedings, 2023
The purpose of this work is to research the possibility of a side-channel attack, more precisely power consumption attack (recovering the encryption key according to the board’s power consumption schedule) on the AES-128 algorithm implemented in hardware.
Alla Levina, Roman Bolozovskii
doaj   +1 more source

Malware Guard Extension: abusing Intel SGX to conceal cache attacks

open access: yesCybersecurity, 2020
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz   +4 more
doaj   +1 more source

SonarSnoop: active acoustic side-channel attacks [PDF]

open access: yesInternational Journal of Information Security, 2019
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be used to profile user interaction with the device.
Peng Cheng   +3 more
openaire   +5 more sources

Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman

open access: yesCryptogr., 2020
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in which sensitive information can be recovered by analyzing physical phenomena of a device during operation.
M. Randolph, William Diehl
semanticscholar   +1 more source

I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators [PDF]

open access: yesAsia-Pacific Computer Systems Architecture Conference, 2018
Deep learning has become the de-facto computational paradigm for various kinds of perception problems, including many privacy-sensitive applications such as online medical image analysis.
Lingxiao Wei   +4 more
semanticscholar   +1 more source

Open DNN Box by Power Side-Channel Attack [PDF]

open access: yesIEEE Transactions on Circuits and Systems - II - Express Briefs, 2019
Deep neural networks are becoming popular and important assets of many AI companies. However, recent studies indicate that they are also vulnerable to adversarial attacks. Adversarial attacks can be either white-box or black-box.
Yun Xiang   +9 more
semanticscholar   +1 more source

Fault Template Attack Based on Fault Probability

open access: yesIEEE Access, 2023
Template attack uses leaked information from various side channels and may break out the countermeasures embedded in the algorithm, which is considered a powerful side-channel attack method.
Tong Wu, Dawei Zhou, Lei Du, Shiwei Wang
doaj   +1 more source

Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling

open access: yesIEEE Access, 2023
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks
Dongjun Park   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy