1,802 Hits in 6.2 sec

NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering [article]

Yukui Luo, Shijin Duan, Cheng Gongye, Yunsi Fei, Xiaolin Xu
2022 arXiv   pre-print
Our study demonstrates that both the optimization and configuration of tensor programs will affect the EM side-channel leakage.  ...  Several prior works have utilized side-channel leakage to recover the model architecture while the target is executing on a hardware acceleration platform.  ...  Thus, a primary idea of mitigating the EM side-channel leakage is to increase the searching space of the Opt-config for each Conv2D layer.  ... 
arXiv:2203.12046v1 fatcat:sysfzpee3javfepcm4j5zaycbu

A Primer on Hardware Security: Models, Methods, and Metrics

Masoud Rostami, Farinaz Koushanfar, Ramesh Karri
2014 Proceedings of the IEEE  
Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions.  ...  This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks  ...  Rajendran (New York University, New York, NY, USA) for his input.  ... 
doi:10.1109/jproc.2014.2335155 fatcat:5k3zmw4mq5fida5ph6n5scrjdy

Table of Contents

2022 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Bhunia 854 Imitating Functional Operations for Mitigating Side-Channel Leakage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Kang 1142 A Novel Algorithm for Hardware Trojan Detection Through Reverse Engineering . . . . . . . . . . . . . S. Rajendran and M. L.  ... 
doi:10.1109/tcad.2022.3155796 fatcat:nyqxkk2s5fee5pvopgoxpwtv2y

PLATYPUS: Software-based Power Side-Channel Attacks on x86

Moritz Lipp, Andreas Kogler, David Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss
2021 2021 IEEE Symposium on Security and Privacy (SP)  
Power side-channel attacks exploit variations in power consumption to extract secrets from a device, e.g., cryptographic keys.  ...  In this paper, we present PLATYPUS attacks, which are novel software-based power side-channel attacks on Intel server, desktop, and laptop CPUs.  ...  Further, we would like to thank Equinix Metal for providing us access to bare metal instances to run our experiments.  ... 
doi:10.1109/sp40001.2021.00063 fatcat:2gcaj243obesti725i62pfwhti

Information and Knowledge Leakage in Supply Chain

Kim Hua Tan, W. P. Wong, Leanne Chung
2015 Information Systems Frontiers  
Therefore, it also adds new knowledge of managing information and knowledge leakage to supply chain management.  ...  Please see the repository url above for details on accessing the published version and note that access may require a subscription.  ...  Acknowledgement: The authors would like to thank Mr Ernest Chong for his help in the case study data collection. Wong W.P. thanks the support of Universiti Sains Malaysia RU Grant (1001/PMGT/816191).  ... 
doi:10.1007/s10796-015-9553-6 fatcat:eu2ftil345hu7aldzbgghqsq2q

Simulation Study of the Use of AlGaN/GaN Ultra-Thin-Barrier HEMTs with Hybrid Gates for Achieving a Wide Threshold Voltage Modulation Range

Shouyi Wang, Qi Zhou, Kuangli Chen, Pengxiang Bai, Jinghai Wang, Liyang Zhu, Chunhua Zhou, Wei Gao, Bo Zhang
2022 Materials  
Moreover, the MIS-gate part enables the effective reduction in the electric field (E-field) peak at the drain-side edge of the p-GaN gate, which reduces the potential gate degradation originating from  ...  The proposed HG-UTB HEMTs are a potential means to achieve normally off GaN HEMTs with a promising device performance and featuring a flexible VTH modulation range, which is of great interest for versatile  ...  Moreover, the E-field crowing located at the p-GaN edge is effectively mitigated by the MIS-gate part, which is beneficial for reducing the gate leakage through the Schottky type p-GaN gate introduced  ... 
doi:10.3390/ma15020654 pmid:35057371 pmcid:PMC8778785 fatcat:yxzkl3xyejernfjikikachfe4i

Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level

Quentin Forcioli, Jean-Luc Danger, Clementine Maurice, Lilian Bossuet, Florent Bruguier, Maria Mushtaq, David Novo, Loic France, Pascal Benoit, Sylvain Guilley, Thomas Perianin
2021 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)  
One typical example is the exploitation of cache memory which keeps track of the program execution and paves the way to side-channel (SCA) analysis and transient execution attacks like Meltdown and Spectre  ...  The gem5 simulator, whose configuration can be customized to a specific CPU or SoC architecture, is the basis of our chosen platform for security analysis.  ...  The real hardware could provide some undocumented assistance to the OS to avoid side-channel leakage, such feature would only lead to a difference in behavior in a baremetal execution.  ... 
doi:10.1109/eurospw54576.2021.00017 fatcat:ljhuwgh3ebb47ksi3bocapspmy

A Survey on Hardware Vulnerability Analysis Using Machine Learning

Zhixin Pan, Prabhat Mishra
2022 IEEE Access  
Specifically, we discuss how existing approaches effectively utilize machine learning algorithms for hardware security verification using simulation-based validation, formal verification as well as side-channel  ...  To the best of our knowledge, there are no comprehensive surveys on utilization of machine learning techniques for detection and mitigation of a wide variety of hardware vulnerabilities including malicious  ...  Next, it selects side-channel leakage window and applies a ML-based clustering algorithm to plot the distribution of side-channel information.  ... 
doi:10.1109/access.2022.3173287 fatcat:yri7ggwdnjffzmpgojiuvr54ta

ExpGen: A 2-Step Vulnerability Exploitability Evaluation Solution for Binary Programs under ASLR Environment

Hui Huang, Yuliang Lu, Zulie Pan, Kailong Zhu, Lu Yu, Liqun Zhang
2022 Applied Sciences  
Therefore, they usually fail in evaluating exploitability for vulnerable programs running in an ASLR environment.  ...  test programs, 10 CTF&RHG programs and four real-world applications with known vulnerabilities, we demonstrate that ExpGen can effectively generate partial exploit input that carries out some address-leakage  ...  Acknowledgments: We would like to sincerely thank all the reviewers for your time and expertise on this paper. Your insightful comments help us improve this work.  ... 
doi:10.3390/app12136593 fatcat:y3ua3sh4lvazhcm646265ze2di

A Survey of Timing Channels and Countermeasures

Arnab Kumar Biswas, Dipak Ghosal, Shishir Nagaraja
2017 ACM Computing Surveys  
This survey builds upon the last comprehensive survey by [Zander et al. 2007 ] and considers all the three canonical applications of timing channels namely, covert communication, timing side-channel, and  ...  A timing channel is a communication channel that can transfer information to a receiver/decoder by modulating the timing behavior of an agent.  ...  In the context of information leakage, timing side channel (TSC) is a type of side channel where information is leaked due to faulty or vulnerable operation of a system or by a timing attack.  ... 
doi:10.1145/3023872 fatcat:bj7jt5qwtbet3lzp5yghle4c3m

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
Unfortunately, these properties also leave Android vulnerable, attracting attacks for profit or fun. To mitigate these threats, numerous issue-specific solutions have been proposed.  ...  CCS Concepts: r Security and privacy → Mobile platform security; Malware and its mitigation; Social aspects of security and privacy Additional  ...  SIDE CHANNELS AND COVERT CHANNELS All operating systems are subject to side-channel attacks as well as information leakage via covert channels, and Android is no exception.  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

On the Security of LEO Satellite Communication Systems: Vulnerabilities, Countermeasures, and Future Trends [article]

Pingyue Yue, Jianping An, Jiankang Zhang, Gaofeng Pan, Shuai Wang, Pei Xiao, Lajos Hanzo
2022 arXiv   pre-print
Since there is a paucity of literature on the security issues of LEO Satellite Communication Systems (SCSs), we aim for filling this knowledge gap.  ...  Furthermore, we shed light on several promising future research directions for enhancing the security of LEO SCSs, such as secure quantum communications, three-dimensional virtual arrays, artificial intelligence-based  ...  To tackle this problem, side-lobe randomization [112] may be used for alleviating side-lobe information leakage.  ... 
arXiv:2201.03063v1 fatcat:pbh6bqtyfnadrmyea6qzf7zzwi

The potential of functional scaling

A. Chin, S.P. McAlister
2005 IEEE Circuits & Devices  
This provides more efficient channel charge control by the gate voltage; i.e., higher transconductance.  ...  Unfortunately, this down-scaling of t ox (∼ 1.2 nm thickness in present technologies) also leads to a higher leakage  ...  This can be mitigated by moving to FinFET device structures [2] .  ... 
doi:10.1109/mcd.2005.1388766 fatcat:kutsxwyf6zazdhzedvtgkw265i

Security Vulnerabilities Against Fingerprint Biometric System [article]

Mahesh Joshi, Bodhisatwa Mazumdar, Somnath Dey
2018 arXiv   pre-print
Due to the high efficiency of fingerprint biometric system in verifying a legitimate user, numerous government and private organizations are using this system for security purpose.  ...  Masking is a commonly proposed technique for defending against these side-channel attacks [32] . Integrated Circuits with active shield can be used to avoid side channel leakages.  ...  Another way to mitigate side channel attacks is to modify the implementation of the cryptographic algorithm such that all computations consume same power and use equal number of clock cycles.  ... 
arXiv:1805.07116v1 fatcat:id7chc2hi5bszf3cszijf2bdp4

Evaluation of Eigenvalue and Block Diagonalization Beamforming Precoding Performance for 5G Technology over Rician Channel

2019 Tehnički Vjesnik  
This paper evaluates the symbol-detection performance for BDP and EP in MU-MIMO beamforming over a Rayleigh fading channel.  ...  Exploiting the channel state information (CSI) in a multi-user MIMO (MU-MIMO) system can improve the performance of the channel link by designing the precoding vectors for every user.  ...  Therefore, the operation of multi-user interference cancellation is often done on the BS side.  ... 
doi:10.17559/tv-20170624224254 fatcat:2f3q4ahdhnbcjdhxjqhfmfdytu
« Previous Showing results 1 — 15 out of 1,802 results