Results 41 to 50 of about 31,170 (306)
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
The distinguishing feature of the Internet of Things is that many devices get interconnected. The threat of side-channel attacks in this setting is less understood than the threat of traditional network and software exploitation attacks that are ...
Daniel Dinu, Ilya Kizhvatov
doaj +1 more source
Codes for Side-Channel Attacks and Protections [PDF]
This article revisits side-channel analysis from the standpoint of coding theory. On the one hand, the attacker is shown to apply an optimal decoding algorithm in order to recover the secret key from the analysis of the side-channel. On the other hand, the side-channel protections are presented as a coding problem where the information is mixed with ...
Guilley, Sylvain+2 more
openaire +2 more sources
In this paper, a deep-learning based power/EM analysis attack on the state-of-the-art RSA–CRT software implementation is proposed. Our method is applied to a side-channel-aware implementation with the Gnu Multi-Precision (MP) Library, which is a typical
Kotaro Saito+3 more
doaj +3 more sources
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation
Deep learning (DL)-based techniques have recently proven to be very successful when applied to profiled side-channel attacks (SCA). In a real-world profiled SCA scenario, attackers gain knowledge about the target device by getting access to a similar ...
Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu
doaj +1 more source
Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor
Cache side channel attacks extract secret information by monitoring the cache behavior of a victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim.
Jonghyeon Cho+5 more
doaj +1 more source
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro+2 more
wiley +1 more source
RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted execution environment (TEE) that isolates secure and insecure applications. In this study, we propose a
Shoei Nashimoto+3 more
doaj +1 more source
Cyclic nucleotide signaling as a drug target in retinitis pigmentosa
Disruptions in cGMP and cAMP signaling can contribute to retinal dysfunction and photoreceptor loss in retinitis pigmentosa. This perspective examines the mechanisms and evaluates emerging evidence on targeting these pathways as a potential therapeutic strategy to slow or prevent retinal degeneration.
Katri Vainionpää+2 more
wiley +1 more source
Optical Side Channel Attacks on Singlechip [PDF]
Optical side channel attack is a new kind of method against cipher chips, such as singlechips implementing public cryptographic algorithms. Two kind of optical side channel attacks, active and passive attacks, are presented in this paper. First, we implemented optical fault injection attacks against cipher algorithms running on AT89C52 singlechip, and ...
J.G. Chen+5 more
openaire +2 more sources
Long non‐coding RNAs (lncRNAs) occupy an abundant fraction of the eukaryotic transcriptome and an emerging area in cancer research. Regulation by lncRNAs is based on their subcellular localization in HNSCC. This cartoon shows the various functions of lncRNAs in HNSCC discussed in this review.
Ellen T. Tran+3 more
wiley +1 more source