نتایج جستجو برای: side channel
تعداد نتایج: 425516 فیلتر نتایج به سال:
Side-channel attacks (SCAs) are powerful that could be used to retrieve keys from electronic devices. Several physical leakage sources can exploited in SCAs, such as power, time, heat, and so on. Heat is one of the side-channels not frequently analyzed by attackers literature due high noise associated with thermal traces. This article investigates practicality adapting power-based SCAs [i.e., c...
A typical implementation of BB84 protocol for quantum communication uses four laser diodes transmitting weak coherent pulses, which may not have the same characteristics. We characterized these lasers mismatch in various parameters such as spectral width, pulse spatial mode, peak wavelength, polarization and their arrival times at receiver. This information is utilized to calculate possible lea...
Microarchitectural attacks on computing systems often stem from simple artefacts in the underlying architecture. In this paper, we focus Return Address Stack (RAS), a small hardware stack present modern processors to reduce branch miss penalty by storing return addresses of each function call. The RAS is useful handle specifically predictions for RET instructions which are not accurately predic...
In the field of side-channel analysis, profiled attacks are one most powerful types attacks. Nevertheless, major issues with in sensitivity to noise and high-dimensional nature signals used for training, generating a less efficient classifier conduct attack phase. Consequently, evaluating security cryptographic implementation hardware devices like IoT becomes more complex as analysis evaluation...
Partial control-flow linearization is a code transformation conceived to maximize work performed in vectorized programs. In this article, we find new service for it. We show that partial protects programs against timing attacks. This sound: Given an instance of its public inputs, the partially linearized program always runs same sequence instructions, regardless secret inputs. Incidentally, if ...
Spiking neural networks (SNNs) are quickly gaining traction as a viable alternative to deep (DNNs). Compared DNNs, SNNs computationally more powerful and energy efficient. The design metrics (synaptic weights, membrane threshold, etc.) chosen for such SNN architectures often proprietary constitute confidential intellectual property (IP). Our study indicates that implemented using conventional a...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, cryptographic implementations. Such implementations, however, are microarchitecture-specific, and cannot be implemented without an in-depth structural knowledge the CPU memory information leakage patterns; a description such leakages is presently not disclosed by any processor design company. In this w...
Nowadays, Side Channel Analysis is one of the most powerful cryptanalytic technique against cryptosystems embedded in portable devices such as smart cards. Faced with this threat, it is of crucial importance to precisely determine what is achievable by a given side channel adversary against a cryptosystem producing a given side channel leakage. This can be answered by evaluating the success rat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید