Filters








65,029 Hits in 4.3 sec

An overview of side channel analysis attacks

Thanh-Ha Le, Cécile Canovas, Jessy Clédière
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
The goal of this paper is to give a global view of statistical attacks based on side channel analysis. These techniques are classified into two classes: attacks without reference device (e.g.  ...  In this paper, we present the attacks with an easy comprehensible way and focus on their implementation aspect.  ...  SIDE CHANNEL ATTACKS WITH A REFERENCE DEVICE In this section, we focus on the template and the stochastic attacks.  ... 
doi:10.1145/1368310.1368319 dblp:conf/ccs/LeCC08 fatcat:usybbkmdzjcjjej2m3tzhy4zvm

Side channel attacks on smart home systems: A short overview

Mohammad Ali Nassiri Abrishamchi, Abdul Hanan Abdullah, Adrian David Cheok, Kevin S. Bielawski
2017 IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society  
This paper starts by reviewing side-channel attack categories, then it gives an overview on recent attack studies on different layers of a smart home and their malicious goals.  ...  Permanent repository link: http://openaccess.city.ac.uk/19447/ Link to published version: http://dx.Abstract-This paper provides an overview on side-channel attacks with emphasis on vulnerabilities in  ...  example of an acoustic side-channel attack on printers.  ... 
doi:10.1109/iecon.2017.8217429 dblp:conf/iecon/AbrishamchiACB17 fatcat:p5l6yaht2fekbncffx6h2c4vyu

Side-channel issues for designing secure hardware implementations

L. Batina, N. Mentens, I. Verbauwhede
2005 11th IEEE International On-Line Testing Symposium  
This work gives an overview of the state-of-the-art in implementation attacks, reviews the origin of this problem at the CMOS circuit level and discusses countermeasures.  ...  This class of attacks are called side-channel attacks. Another type of attacks, namely fault attacks, reveal secret information by inserting faults into the device.  ...  Side-channel attacks This section elaborates on the three most commonly exploited side-channel attacks, namely timing, power analysis and electromagnetic radiation attacks.  ... 
doi:10.1109/iolts.2005.64 dblp:conf/iolts/BatinaMV05 fatcat:bkeqqr5tfrfdrnv27yys62qr24

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks [chapter]

HoonJae Lee, ManKi Ahn, SeonGan Lim, SangJae Moon
2004 Lecture Notes in Computer Science  
We analyzes the side channel attacks for the smart card and similar security evaluation criteria for smart card protection profiles based on the common criterion.  ...  Futhermore, we proposes the smart card security evaluation criteria for side channel attacks about vulnerability assessment activities in Security Assurance Requirements.  ...  Conclusion We analyzed the side channel attacks for the smart card until comparatively lately and made an experiment in power analysis attacks.  ... 
doi:10.1007/978-3-540-24707-4_63 fatcat:er4w4vrvpnenziiax67v3udnly

Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities [article]

Mahya Morid Ahmadi, Faiq Khalid, Muhammad Shafique
2021 arXiv   pre-print
Towards this, we perform an in-depth analysis of the applicability and practical implications of cache attacks on RISC-V microprocessors and their associated challenges.  ...  The focus of this paper is to analyze the hardware-exploitable side-channel attack using power consumption and software-exploitable side-channel attacks to manipulate cache.  ...  ACKNOWLEDGMENT This work was partially supported by Doctoral College Resilient Embedded Systems which is run jointly by TU Wien's Faculty of Informatics and FH-Technikum Wien.  ... 
arXiv:2106.08877v1 fatcat:zdalqpzvajatjhvu4ik7ccvwky

Security for Machine Learning-Based Systems: Attacks and Challenges During Training and Inference

Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique
2018 2018 International Conference on Frontiers of Information Technology (FIT)  
Moreover, based on the security analysis of ML-training, we also propose an attack that has a very less impact on the inference accuracy.  ...  The exponential increase in dependencies between the cyber and physical world leads to an enormous amount of data which must be efficiently processed and stored.  ...  , IP Stealing Security Threats ❑ Side Channel Attacks ❑ Hardware IntrusionsFig. 4: An Overview of Security Threats/Attacks and their respective payloads for Machine Learning Algorithms during Training,  ... 
doi:10.1109/fit.2018.00064 dblp:conf/fit/KhalidHR018 fatcat:6nonza3xx5bdrb522gni46zrqm

Embedded systems security—an overview

Sri Parameswaran, Tilman Wolf
2008 Design automation for embedded systems  
Security is an important aspect of embedded system design. The characteristics of embedded systems give rise to a number of novel vulnerabilities.  ...  A variety of different solutions are being developed to address these security problems. In this paper, we provide a brief overview of important research topics in this domain.  ...  attacks [75] are examples of side channel attacks.  ... 
doi:10.1007/s10617-008-9027-x fatcat:eydslqk47ff2jfhby3z3xpudg4

Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard
2018 IEEE Communications Surveys and Tutorials  
While traditional side-channel attacks, such as power analysis attacks and electromagnetic analysis attacks, required physical presence of the attacker as well as expensive equipment, an (unprivileged)  ...  Besides this new categorization system, the extensive survey of existing attacks and attack strategies provides valuable insights into the evolving field of side-channel attacks, especially when focusing  ...  LOWER PART: SURVEYS ON SIDE-CHANNEL ATTACKS. TABLE II OVERVIEW II OF LOCAL SIDE-CHANNEL ATTACKS AND CORRESPONDING TARGETS.  ... 
doi:10.1109/comst.2017.2779824 fatcat:4r5ceyc7pbdfxdmngtdncv4n5m

A Novel Design Flow for a Security-Driven Synthesis of Side-Channel Hardened Cryptographic Modules

Sorin Huss, Oliver Stein
2017 Journal of Low Power Electronics and Applications  
Up to now, these design tools do not yet support an integrated design strategy for the development of side-channel-resistant hardware implementations.  ...  In order to close this gap, a novel framework named AMASIVE (Adaptable Modular Autonomous SIde-Channel Vulnerability Evaluator) was developed.  ...  Author Contributions: The authors shared the work related to both the development of the fundamental concept and to the writing of this paper.  ... 
doi:10.3390/jlpea7010004 fatcat:6s7e7kll7falpo4bolpe3dijv4

Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments

Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri
2014 Proceedings of the 11th International Conference on Security and Cryptography  
In particular the virtualized environment is supposed to guarantee the impossibility of an adversary to attack a virtual machine e.g., by exploiting a side-channel stemming from the usage of shared physical  ...  As a proof of concept we show that the feasibility of cache-based side-channel attacks can be assessed following the proposed approach.  ...  This paper classifies existing side-channel attacks taking into consideration the characteristics of the context and provides an initial approach for a feasibility analysis for cache-based side-channel  ... 
doi:10.5220/0005052101130124 dblp:conf/secrypt/Vateva-GurovaLPS14 fatcat:kxzi2kb2ordole7ynfb5odtgdi

A Study on Power Side Channels on Mobile Devices [article]

Lin Yan, Yao Guo, Xiangqun Chen, Hong Mei
2015 arXiv   pre-print
Based on these power side channels, we discuss possible exploitations and present a general approach to exploit a power side channel on an Android smartphone, which demonstrates that power side channels  ...  These attack examples demonstrate that power consumption traces can be used as a practical side channel to gain various confidential information of mobile apps running on smartphones.  ...  Power Side Channels Power analysis attacks (or power side channels, PSCs) have become an important type of side channel attacks.  ... 
arXiv:1512.07972v1 fatcat:jxbbac6cvncx5by2on573qoqsm

Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements

Richard Frankland, Denise Demirel, Jurlind Budurushi, Melanie Volkamer
2011 2011 International Workshop on Requirements Engineering for Electronic Voting Systems  
Therefore, in this paper we present an analysis showing how common components of eVoting machines may be vulnerable to sidechannel attacks.  ...  As side-channel leakage is also not sufficiently addressed in the many available requirement documents for eVoting systems, we also define requirements for side-channels within the scope of eVoting machine  ...  In Section III, a short overview of the development of side-channel cryptanalysis will be given, going through the principles of attacks.  ... 
doi:10.1109/revote.2011.6045914 dblp:conf/re/FranklandDBV11 fatcat:qnjxwc3b5rf6jndpgsfuy3wk2e

Side channels as building blocks

Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne Burleson
2012 Journal of Cryptographic Engineering  
Since the introduction of the first side-channel analyses in academia about 15 years ago, several physical attacks have been presented that exploit side-channel leakages to break implementations of cryptographic  ...  Furthermore we present an entirely new design of a Trojan side-channel. This architecture demonstrates the potential of a Trojan side-channel that is neatly tailored to the targeted implementation.  ...  Section 2 provides a short overview of side-channel analysis attacks.  ... 
doi:10.1007/s13389-012-0040-4 fatcat:2nk3ft3irze6tobihtry2uwkd4

Protecting cryptographic integrated circuits with side-channel information

Makoto Nagata, Daisuke Fujimoto, Noriyuki Miura, Naofumi Homma, Yu-ichi Hayashi, Kazuo Sakiyama
2017 IEICE Electronics Express  
This paper provides an overview of the protection techniques with counter ways of utilizing sidechannel information leakage for combatting side-channel attacks as well as securing the authenticity of devices  ...  Side-channel attacks have emerged as the nondestructive threats of security vulnerability in cryptographic hardware.  ...  Conclusion This paper overviewed protection techniques against side-channel information leakage and attacks. The dual-coil SCA sensor disables an attacker with proximate EM probes.  ... 
doi:10.1587/elex.14.20162005 fatcat:r7tde5cp4rgbncku7umezsphfm

Electromagnetic Side-Channel Attack on AES using Low-end Equipment

Martin Hell, Oskar Westman
2020 ECTI Transactions on Computer and Information Technology  
Side-channel attacks on cryptographic algorithms targets the implementation of the algorithm.  ...  We examine to which extent key information from an AES implementation can be deduced using a low-end oscilloscope.  ...  It will cover the different steps in the attack and also give an overview of the AES encryption algorithm, which is the block cipher subject to our attacks. 1 Electromagnetic Side-Channel Cryptanalysis  ... 
doi:10.37936/ecti-cit.2020142.239925 fatcat:wxojiwzvqzht3m3k4dkoxubkya
« Previous Showing results 1 — 15 out of 65,029 results