Results 51 to 60 of about 212,817 (301)

EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
The distinguishing feature of the Internet of Things is that many devices get interconnected. The threat of side-channel attacks in this setting is less understood than the threat of traditional network and software exploitation attacks that are ...
Daniel Dinu, Ilya Kizhvatov
doaj   +1 more source

Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Software Guard Extension (SGX) is a hardware-based trusted execution environment (TEE) implemented in recent Intel commodity processors. By isolating the memory of security-critical applications from untrusted software, this mechanism provides users with
Tianlin Huo   +6 more
semanticscholar   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Real-Time Detection for Cache Side Channel Attack using Performance Counter Monitor

open access: yesApplied Sciences, 2020
Cache side channel attacks extract secret information by monitoring the cache behavior of a victim. Normally, this attack targets an L3 cache, which is shared between a spy and a victim.
Jonghyeon Cho   +5 more
doaj   +1 more source

Enzymatic degradation of biopolymers in amorphous and molten states: mechanisms and applications

open access: yesFEBS Open Bio, EarlyView.
This review explains how polymer morphology and thermal state shape enzymatic degradation pathways, comparing amorphous and molten biopolymer structures. By integrating structure–reactivity principles with insights from thermodynamics and enzyme engineering, it highlights mechanisms that enable efficient polymer breakdown.
Anđela Pustak, Aleksandra Maršavelski
wiley   +1 more source

Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Deep learning (DL)-based techniques have recently proven to be very successful when applied to profiled side-channel attacks (SCA). In a real-world profiled SCA scenario, attackers gain knowledge about the target device by getting access to a similar ...
Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu
doaj   +1 more source

Olink Proteomics Analysis Reveals Heterogeneous Responses to FcRn Blockade in Anti‐AChR Antibody‐Positive Myasthenia Gravis: FGF‐19 as a Novel Biomarker

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective This study aimed to systematically observe the clinical manifestations, immune cell subsets, and dynamic changes in serological indicators in patients with myasthenia gravis (MG) before and after efgartigimod (EFG) treatment. Methods We analyzed the baseline data, laboratory parameters, and lymphocyte subset proportions in MG ...
Tiancheng Luo   +9 more
wiley   +1 more source

Functional Connectivity Linked to Cognitive Recovery After Minor Stroke

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Patients with minor stroke exhibit slowed processing speed and generalized alterations in functional connectivity involving frontoparietal cortex (FPC). The pattern of connectivity evolves over time. In this study, we examine the relationship of functional connectivity patterns to cognitive performance, to determine ...
Vrishab Commuri   +7 more
wiley   +1 more source

Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted execution environment (TEE) that isolates secure and insecure applications. In this study, we propose a
Shoei Nashimoto   +3 more
doaj   +1 more source

PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance [PDF]

open access: yesIEEE International Symposium on Hardware Oriented Security and Trust, 2019
The power consumption of a microprocessor is a huge channel for information leakage. While the most popular exploitation of this channel is to recover cryptographic keys from embedded devices, other applications such as mobile app fingerprinting, reverse
F. MuhammadArsathK.   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy