A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering
[article]
2022
arXiv
pre-print
Our study demonstrates that both the optimization and configuration of tensor programs will affect the EM side-channel leakage. ...
Several prior works have utilized side-channel leakage to recover the model architecture while the target is executing on a hardware acceleration platform. ...
Thus, a primary idea of mitigating the EM side-channel leakage is to increase the searching space of the Opt-config for each Conv2D layer. ...
arXiv:2203.12046v1
fatcat:sysfzpee3javfepcm4j5zaycbu
A Primer on Hardware Security: Models, Methods, and Metrics
2014
Proceedings of the IEEE
Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. ...
This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks ...
Rajendran (New York University, New York, NY, USA) for his input. ...
doi:10.1109/jproc.2014.2335155
fatcat:5k3zmw4mq5fida5ph6n5scrjdy
Table of Contents
2022
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Bhunia 854 Imitating Functional Operations for Mitigating Side-Channel Leakage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Kang 1142 A Novel Algorithm for Hardware Trojan Detection Through Reverse Engineering . . . . . . . . . . . . . S. Rajendran and M. L. ...
doi:10.1109/tcad.2022.3155796
fatcat:nyqxkk2s5fee5pvopgoxpwtv2y
PLATYPUS: Software-based Power Side-Channel Attacks on x86
2021
2021 IEEE Symposium on Security and Privacy (SP)
Power side-channel attacks exploit variations in power consumption to extract secrets from a device, e.g., cryptographic keys. ...
In this paper, we present PLATYPUS attacks, which are novel software-based power side-channel attacks on Intel server, desktop, and laptop CPUs. ...
Further, we would like to thank Equinix Metal for providing us access to bare metal instances to run our experiments. ...
doi:10.1109/sp40001.2021.00063
fatcat:2gcaj243obesti725i62pfwhti
Information and Knowledge Leakage in Supply Chain
2015
Information Systems Frontiers
Therefore, it also adds new knowledge of managing information and knowledge leakage to supply chain management. ...
Please see the repository url above for details on accessing the published version and note that access may require a subscription. ...
Acknowledgement: The authors would like to thank Mr Ernest Chong for his help in the case study data collection. Wong W.P. thanks the support of Universiti Sains Malaysia RU Grant (1001/PMGT/816191). ...
doi:10.1007/s10796-015-9553-6
fatcat:eu2ftil345hu7aldzbgghqsq2q
Simulation Study of the Use of AlGaN/GaN Ultra-Thin-Barrier HEMTs with Hybrid Gates for Achieving a Wide Threshold Voltage Modulation Range
2022
Materials
Moreover, the MIS-gate part enables the effective reduction in the electric field (E-field) peak at the drain-side edge of the p-GaN gate, which reduces the potential gate degradation originating from ...
The proposed HG-UTB HEMTs are a potential means to achieve normally off GaN HEMTs with a promising device performance and featuring a flexible VTH modulation range, which is of great interest for versatile ...
Moreover, the E-field crowing located at the p-GaN edge is effectively mitigated by the MIS-gate part, which is beneficial for reducing the gate leakage through the Schottky type p-GaN gate introduced ...
doi:10.3390/ma15020654
pmid:35057371
pmcid:PMC8778785
fatcat:yxzkl3xyejernfjikikachfe4i
Virtual Platform to Analyze the Security of a System on Chip at Microarchitectural Level
2021
2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
One typical example is the exploitation of cache memory which keeps track of the program execution and paves the way to side-channel (SCA) analysis and transient execution attacks like Meltdown and Spectre ...
The gem5 simulator, whose configuration can be customized to a specific CPU or SoC architecture, is the basis of our chosen platform for security analysis. ...
The real hardware could provide some undocumented assistance to the OS to avoid side-channel leakage, such feature would only lead to a difference in behavior in a baremetal execution. ...
doi:10.1109/eurospw54576.2021.00017
fatcat:ljhuwgh3ebb47ksi3bocapspmy
A Survey on Hardware Vulnerability Analysis Using Machine Learning
2022
IEEE Access
Specifically, we discuss how existing approaches effectively utilize machine learning algorithms for hardware security verification using simulation-based validation, formal verification as well as side-channel ...
To the best of our knowledge, there are no comprehensive surveys on utilization of machine learning techniques for detection and mitigation of a wide variety of hardware vulnerabilities including malicious ...
Next, it selects side-channel leakage window and applies a ML-based clustering algorithm to plot the distribution of side-channel information. ...
doi:10.1109/access.2022.3173287
fatcat:yri7ggwdnjffzmpgojiuvr54ta
ExpGen: A 2-Step Vulnerability Exploitability Evaluation Solution for Binary Programs under ASLR Environment
2022
Applied Sciences
Therefore, they usually fail in evaluating exploitability for vulnerable programs running in an ASLR environment. ...
test programs, 10 CTF&RHG programs and four real-world applications with known vulnerabilities, we demonstrate that ExpGen can effectively generate partial exploit input that carries out some address-leakage ...
Acknowledgments: We would like to sincerely thank all the reviewers for your time and expertise on this paper. Your insightful comments help us improve this work. ...
doi:10.3390/app12136593
fatcat:y3ua3sh4lvazhcm646265ze2di
A Survey of Timing Channels and Countermeasures
2017
ACM Computing Surveys
This survey builds upon the last comprehensive survey by [Zander et al. 2007 ] and considers all the three canonical applications of timing channels namely, covert communication, timing side-channel, and ...
A timing channel is a communication channel that can transfer information to a receiver/decoder by modulating the timing behavior of an agent. ...
In the context of information leakage, timing side channel (TSC) is a type of side channel where information is leaked due to faulty or vulnerable operation of a system or by a timing attack. ...
doi:10.1145/3023872
fatcat:bj7jt5qwtbet3lzp5yghle4c3m
Toward Engineering a Secure Android Ecosystem
2016
ACM Computing Surveys
Unfortunately, these properties also leave Android vulnerable, attracting attacks for profit or fun. To mitigate these threats, numerous issue-specific solutions have been proposed. ...
CCS Concepts: r Security and privacy → Mobile platform security; Malware and its mitigation; Social aspects of security and privacy Additional ...
SIDE CHANNELS AND COVERT CHANNELS All operating systems are subject to side-channel attacks as well as information leakage via covert channels, and Android is no exception. ...
doi:10.1145/2963145
fatcat:d5vhxpdywrevvbh4as6vvt576q
On the Security of LEO Satellite Communication Systems: Vulnerabilities, Countermeasures, and Future Trends
[article]
2022
arXiv
pre-print
Since there is a paucity of literature on the security issues of LEO Satellite Communication Systems (SCSs), we aim for filling this knowledge gap. ...
Furthermore, we shed light on several promising future research directions for enhancing the security of LEO SCSs, such as secure quantum communications, three-dimensional virtual arrays, artificial intelligence-based ...
To tackle this problem, side-lobe randomization [112] may be used for alleviating side-lobe information leakage. ...
arXiv:2201.03063v1
fatcat:pbh6bqtyfnadrmyea6qzf7zzwi
The potential of functional scaling
2005
IEEE Circuits & Devices
This provides more efficient channel charge control by the gate voltage; i.e., higher transconductance. ...
Unfortunately, this down-scaling of t ox (∼ 1.2 nm thickness in present technologies) also leads to a higher leakage ...
This can be mitigated by moving to FinFET device structures [2] . ...
doi:10.1109/mcd.2005.1388766
fatcat:kutsxwyf6zazdhzedvtgkw265i
Security Vulnerabilities Against Fingerprint Biometric System
[article]
2018
arXiv
pre-print
Due to the high efficiency of fingerprint biometric system in verifying a legitimate user, numerous government and private organizations are using this system for security purpose. ...
Masking is a commonly proposed technique for defending against these side-channel attacks [32] . Integrated Circuits with active shield can be used to avoid side channel leakages. ...
Another way to mitigate side channel attacks is to modify the implementation of the cryptographic algorithm such that all computations consume same power and use equal number of clock cycles. ...
arXiv:1805.07116v1
fatcat:id7chc2hi5bszf3cszijf2bdp4
Evaluation of Eigenvalue and Block Diagonalization Beamforming Precoding Performance for 5G Technology over Rician Channel
2019
Tehnički Vjesnik
This paper evaluates the symbol-detection performance for BDP and EP in MU-MIMO beamforming over a Rayleigh fading channel. ...
Exploiting the channel state information (CSI) in a multi-user MIMO (MU-MIMO) system can improve the performance of the channel link by designing the precoding vectors for every user. ...
Therefore, the operation of multi-user interference cancellation is often done on the BS side. ...
doi:10.17559/tv-20170624224254
fatcat:2f3q4ahdhnbcjdhxjqhfmfdytu
« Previous
Showing results 1 — 15 out of 1,802 results