搜索结果: 1-15 共查到“Side channel attack”相关记录19条 . 查询时间(0.114 秒)
X-DeepSCA: Cross-Device Deep Learning Side Channel Attack
Side-channel Attacks Profiling attacks Cross-device Attack
2019/7/17
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel Attack (X-DeepSCA), achieving an accuracy of >99.9%>99.9%, even in presence of significantly higher inter-device ...
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
Side-channel attacks EdDSA Machine learning
2019/4/10
Profiling attacks, especially those based on machine learning proved as very successful techniques in recent years when considering side-channel analysis of block ciphers implementations. At the same ...
Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input
AES Advanced Encryption Standard Side-channel
2019/4/3
Considering AES sub-steps that can be attacked with a small guess space, the most practicable is to target SubBytes of extremal rounds. For its contrast between candidates (non-linearity) and that the...
Ground-up Root-cause Analysis guided Low-Overhead Generic Countermeasure for Electro-Magnetic Side-Channel Attack
EM Side-channel attack generic countermeasure cryptographic hardware
2018/6/25
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-connected devices. While numerous power side-channel countermeasures have been proposed, a promising ap...
We proposed a zero-contention in cache lines a cache policy between REE and TEE to prevent from TruSpy attacks in a kernel memory of an embedded system. We suggested that delay time of data path of RE...
Linear Regression Side Channel Attack Applied on Constant XOR
linear regression side channel attack constant XOR
2017/12/20
Linear regression side channel attack (LRA) used to be known as a robust attacking method as it makes use of independent bits leakage. This leakage assumption is more general than Hamming weight/ Hamm...
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
Side Channel Attacks Curve25519 Cache-Attacks
2017/8/29
In recent years, applications increasingly adopt security primitives designed with better countermeasures against side channel attacks. A concrete example is Libgcrypt's implementation of ECDH encrypt...
Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains
Parallel Algorithms Elliptic Curve Cryptography Scalar Multiplication
2016/12/9
This paper presents parallel scalar multiplication techniques for elliptic curve cryptography using q-based addition-subtraction k-chain which can also effectively resist side-channel attack. Many tec...
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
Side Channel Attack Cache ECDSA
2016/1/25
We illustrate a vulnerability introduced to elliptic curve cryptographic protocols when implemented using a function of the OpenSSL cryptographic library. For the given implementation using an ellipti...
A Statistics-based Fundamental Model for Side-channel Attack Analysis
Side-channel attack maximum likelihood estimation success rate
2016/1/25
Side-channel attacks (SCAs) exploit leakage from the physical
implementation of cryptographic algorithms to recover the otherwise
secret information. In the last decade, popular SCAs like differenti...
Two Operands of Multipliers in Side-Channel Attack
RSA Side-Channel Attack Collision Attack
2015/12/31
The single-shot collision attack on RSA proposed by Hanley
et al. is studied focusing on the difference between two operands
of multipliers. There are two consequences. Firstly, designing order of
...
Success through confidence: Evaluating the effectiveness of a side-channel attack
Side-channel attacks divide-and-conquer strategy
2015/12/31
Side-channel attacks usually apply a divide-and-conquer strategy,
separately recovering different parts of the secret. Their efficiency in
practice relies on the adversary ability to precisely asses...
Counting Keys in Parallel After a Side Channel Attack
key enumeration key rank side channels
2015/12/29
Side channels provide additional information to skilled adversaries
that reduce the effort to determine an unknown key. If sufficient
side channel information is available, identification of the sec...
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
energy lightweight masking
2015/12/23
This paper uses an Instruction Set Architecture (ISA) based
statistical energy model of an ARM Cortex-M4 microprocessor to evaluate
the energy consumption of an implementation of AES with different
...
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack
Side Channel Attack Cache
2014/3/11
Flush+Reload is a cache side-channel attack that monitors access to data in shared pages. In this paper we demonstrate how to use the attack to extract private encryption keys from GnuPG. The high res...