Results 41 to 50 of about 31,170 (306)

EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
The distinguishing feature of the Internet of Things is that many devices get interconnected. The threat of side-channel attacks in this setting is less understood than the threat of traditional network and software exploitation attacks that are ...
Daniel Dinu, Ilya Kizhvatov
doaj   +1 more source

Codes for Side-Channel Attacks and Protections [PDF]

open access: yes, 2017
This article revisits side-channel analysis from the standpoint of coding theory. On the one hand, the attacker is shown to apply an optimal decoding algorithm in order to recover the secret key from the analysis of the side-channel. On the other hand, the side-channel protections are presented as a coding problem where the information is mixed with ...
Guilley, Sylvain   +2 more
openaire   +2 more sources

One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA–CRT with Windowed Exponentiation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
In this paper, a deep-learning based power/EM analysis attack on the state-of-the-art RSA–CRT software implementation is proposed. Our method is applied to a side-channel-aware implementation with the Gnu Multi-Precision (MP) Library, which is a typical
Kotaro Saito   +3 more
doaj   +3 more sources

Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Deep learning (DL)-based techniques have recently proven to be very successful when applied to profiled side-channel attacks (SCA). In a real-world profiled SCA scenario, attackers gain knowledge about the target device by getting access to a similar ...
Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu
doaj   +1 more source

Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor

open access: yesApplied Sciences, 2020
Cache side channel attacks extract secret information by monitoring the cache behavior of a victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim.
Jonghyeon Cho   +5 more
doaj   +1 more source

B cell mechanobiology in health and disease: emerging techniques and insights into therapeutic responses

open access: yesFEBS Letters, EarlyView.
B cells sense external mechanical forces and convert them into biochemical signals through mechanotransduction. Understanding how malignant B cells respond to physical stimuli represents a groundbreaking area of research. This review examines the key mechano‐related molecules and pathways in B lymphocytes, highlights the most relevant techniques to ...
Marta Sampietro   +2 more
wiley   +1 more source

Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted execution environment (TEE) that isolates secure and insecure applications. In this study, we propose a
Shoei Nashimoto   +3 more
doaj   +1 more source

Cyclic nucleotide signaling as a drug target in retinitis pigmentosa

open access: yesFEBS Letters, EarlyView.
Disruptions in cGMP and cAMP signaling can contribute to retinal dysfunction and photoreceptor loss in retinitis pigmentosa. This perspective examines the mechanisms and evaluates emerging evidence on targeting these pathways as a potential therapeutic strategy to slow or prevent retinal degeneration.
Katri Vainionpää   +2 more
wiley   +1 more source

Optical Side Channel Attacks on Singlechip [PDF]

open access: yesProceedings of the 2015 International Conference on Industrial Technology and Management Science, 2015
Optical side channel attack is a new kind of method against cipher chips, such as singlechips implementing public cryptographic algorithms. Two kind of optical side channel attacks, active and passive attacks, are presented in this paper. First, we implemented optical fault injection attacks against cipher algorithms running on AT89C52 singlechip, and ...
J.G. Chen   +5 more
openaire   +2 more sources

Long non‐coding RNAs as therapeutic targets in head and neck squamous cell carcinoma and clinical application

open access: yesFEBS Open Bio, EarlyView.
Long non‐coding RNAs (lncRNAs) occupy an abundant fraction of the eukaryotic transcriptome and an emerging area in cancer research. Regulation by lncRNAs is based on their subcellular localization in HNSCC. This cartoon shows the various functions of lncRNAs in HNSCC discussed in this review.
Ellen T. Tran   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy