Results 31 to 40 of about 27,981 (260)

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Yutaro Tanaka   +5 more
doaj   +1 more source

Sabotage Attack Detection for Additive Manufacturing Systems

open access: yesIEEE Access, 2020
This paper presents a novel multi-modal sabotage attack detection system for Additive Manufacturing (AM) machines. By utilizing multiple side-channels, we improve system state estimation significantly in comparison to uni-modal techniques.
Shih-Yuan Yu   +3 more
doaj   +1 more source

Defeating Hardware Prefetchers in Flush+Reload Side-Channel Attack

open access: yesIEEE Access, 2021
Hardware prefetching can seriously interfere with Flush+Reload cache side channel attack. This interference is not taken into consideration in previous Flush+Reload attacks.
Zihao Wang   +3 more
doaj   +1 more source

On the Challenges of Detecting Side-Channel Attacks in SGX

open access: yesProceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, 2022
Existing tools to detect side-channel attacks on Intel SGX are grounded on the observation that attacks affect the performance of the victim application. As such, all detection tools monitor the potential victim and raise an alarm if the witnessed performance (in terms of runtime, enclave interruptions, cache misses, etc.) is out of the ordinary.
Jiang, Jianyu   +2 more
openaire   +2 more sources

Linear Repairing Codes and Side-Channel Attacks [PDF]

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
To strengthen the resistance of countermeasures based on secret sharing,several works have suggested to use the scheme introduced by Shamir in 1978, which proposes to use the evaluation of a random d-degree polynomial into n ≥ d + 1 public points to share the sensitive data.
Chabanne, Hervé   +2 more
openaire   +2 more sources

Attack of the Knights:Non Uniform Cache Side Channel Attack

open access: yesAnnual Computer Security Applications Conference, 2023
For a distributed last-level cache (LLC) in a large multicore chip, the access time to one LLC bank can significantly differ from that to another due to the difference in physical distance. In this paper, we successfully demonstrated a new distance-based side-channel attack by timing the AES decryption operation and extracting part of an AES secret key
Farabi Mahmud   +5 more
openaire   +2 more sources

Colored Petri Net Based Cache Side Channel Vulnerability Evaluation

open access: yesIEEE Access, 2019
The cache side channel leakage is a very serious security issue in the information security field. In order to solve this problem, a large number of security mechanisms have been applied to protect the cache.
Limin Wang   +3 more
doaj   +1 more source

Dynamic migration method of key virtual network function based on risk awareness

open access: yesTongxin xuebao, 2020
Aiming at the problems that traditional dynamic migration methods have many migration nodes,high migration frequency,and long service function chain (SFC) link path after migration when dealing with side channel attack,a dynamic migration method of ...
Shaohu DING   +4 more
doaj   +2 more sources

One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA–CRT with Windowed Exponentiation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In this paper, a deep-learning based power/EM analysis attack on the state-of-the-art RSA–CRT software implementation is proposed. Our method is applied to a side-channel-aware implementation with the Gnu Multi-Precision (MP) Library, which is a typical
Kotaro Saito   +3 more
doaj   +3 more sources

Codes for Side-Channel Attacks and Protections [PDF]

open access: yes, 2017
This article revisits side-channel analysis from the standpoint of coding theory. On the one hand, the attacker is shown to apply an optimal decoding algorithm in order to recover the secret key from the analysis of the side-channel. On the other hand, the side-channel protections are presented as a coding problem where the information is mixed with ...
Guilley, Sylvain   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy