• Aucun résultat trouvé

side-channel attacks (SCA)

How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip

How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip

... Abstract. Side-channel attacks (SCA) exploit the reification of a com- putation through its physical dimensions (current consumption, EM emis- sion, ...

17

Cache-Based Side-Channel Attacks Detection through Intel Cache Monitoring Technology and Hardware Performance Counters

Cache-Based Side-Channel Attacks Detection through Intel Cache Monitoring Technology and Hardware Performance Counters

... These attacks use a leaky channel to obtain secret information such as cryptographic ...of side-channel attacks is becoming a security concern in cloud computing ...(cross-VM ...

12

Unified isolation architectures and mechanisms against side channel attacks for decentralized cloud infrastructures

Unified isolation architectures and mechanisms against side channel attacks for decentralized cloud infrastructures

... cloud, Side-Channel Attacks (SCA) target highly sensitive data and computations, ...hidden channel that leaks information on an operation such as AES encryption, typically execution time or ...

138

WHISPER A Tool for Run-time Detection of Side-Channel Attacks

WHISPER A Tool for Run-time Detection of Side-Channel Attacks

... Cache-based side-channel attacks (CSCAs) are a special type of SCA, in which a malicious process deduces the secret information of a victim process by observing its use of caching ...Such ...

31

Automated Software Protection for the Masses Against Side-Channel Attacks

Automated Software Protection for the Masses Against Side-Channel Attacks

... Physical attacks represent a major threat for embedded systems; they provide an effective way to recover secret data and to bypass security protections, even for an attacker with a limited budget [31, ...32]. ...

26

Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture

Sherlock Holmes of Cache Side-Channel Attacks in Intel's x86 Architecture

... making side-channel information constant (timing, power, access ...recent attacks like Spectre [10] and Meltdown [11] are evidences that side-channel attacks are becoming even ...

11

Detection of Side Channel Attacks Based on Data Tainting in Android Systems

Detection of Side Channel Attacks Based on Data Tainting in Android Systems

... obfuscation attacks based on control dependencies in the Android ...detected side channel attacks exploiting control flows by combining static and dynamic ...in side channels. ...

15

Soft Analytical Side-Channel Attacks

Soft Analytical Side-Channel Attacks

... The Side-Channel Collision Attacks (SCCA) in [1, 24, 25] were next interesting steps, in which the key is recovered by solving a set of (mostly) linear equations corresponding to the first cipher ...

16

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

... timing attacks. We first demonstrate two novel side-channel attacks to infer keystroke timings, that work on systems where previous keystroke timing attacks are mitigated [14], ...

16

Side Channel Attacks against Pairing over Theta Functions

Side Channel Attacks against Pairing over Theta Functions

... We analyze the weaknesses of the pairings over Theta function with respect to side chan- nel attacks. We consider the differential power analysis and the fault attack. The scheme of the differential power ...

15

FLUSH + PREFETCH: A Countermeasure Against Access-driven Cache-based Side-Channel Attacks

FLUSH + PREFETCH: A Countermeasure Against Access-driven Cache-based Side-Channel Attacks

... as an output. To compute such exponent, this code executes Square (Line 4), Multiply (Line 7) and Barrett (Lines 5 and 8) operations in each iteration of loop (Line 3). The sequence of these operations depend on a bit ...

19

Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks

Evaluation of Countermeasure Implementations Based on Boolean Masking to Thwart Side-Channel Attacks

... Abstract—This paper presents hardware implementations of a DES cryptoprocessor with masking countermeasures and their evaluation against side-channel attacks (SCAs) in FPGAs. The masking protection ...

7

High-Speed Ring Oscillator based Sensors for Remote Side-Channel Attacks on FPGAs

High-Speed Ring Oscillator based Sensors for Remote Side-Channel Attacks on FPGAs

... statistical side-channel attacks against symmetric encryption ...CPA side-channel attack as previously achieved with TDC-based sensors in ...

9

Intrinsic Resiliency of S-boxes Against Side-Channel Attacks -Best And Worst Scenarios

Intrinsic Resiliency of S-boxes Against Side-Channel Attacks -Best And Worst Scenarios

... b) Outline: The rest of the paper is structured as follows. Section II provides the necessary mathematical tools useful for the subsequent analyses. The next section III explains how side-channel ...

17

Remote Side-Channel Attacks on Heterogeneous SoC

Remote Side-Channel Attacks on Heterogeneous SoC

... eavesdrop side-channel leakage induced by surrounding logic blocks and infer secret keys ...algorithms side-channel [8] are some examples of ...FGPA-based side-channel ...

17

Optimization methods for side channel attacks

Optimization methods for side channel attacks

... accelerate attacks and not at- tacks in ...by Side-channel distin- guishers when selecting the best key ...affecting Side-channel traces and the features of used distinguisher ...

223

Improving side-channel attacks against pairing-based cryptography

Improving side-channel attacks against pairing-based cryptography

... scribe side-channel attacks against the modular addi- tions and multiplications of elements in large prime ...these attacks are possible even if the secret point is used as the first argument ...

18

Codes for Side-Channel Attacks and Protections

Codes for Side-Channel Attacks and Protections

... 6. Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, and Olivier Rioul. Less is More - Dimensionality Reduction from a Theoretical Perspective. In Tim Güneysu and Helena Handschuh, editors, Cryptographic ...

25

Multivariate multitarget high order side-channel attacks

Multivariate multitarget high order side-channel attacks

... against side-channel attacks, countermeasures need to be ...template attacks for which one can split the evaluation goals into two parts: offline profiling (building an accurate leakage model) ...

229

Enhancing Dimensionality Reduction Methods for Side-Channel Attacks

Enhancing Dimensionality Reduction Methods for Side-Channel Attacks

... Advanced Side-Channel Analyses make use of dimensionality reduction techniques to reduce both the memory and timing complexity of the ...in side-channel context also raised some ...for ...

21

Show all 1329 documents...

Sujets connexes