搜索结果: 1-12 共查到“军队指挥学 Side Channels”相关记录12条 . 查询时间(0.062 秒)
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information
Side-channel Analysis Artificial Neural Networks Power
2018/5/28
Machine learning has become mainstream across industries. In this work we pose the following question: Is it possible to reverse engineer a neural network by using only side-channel information? We an...
Leakage Bounds for Gaussian Side Channels
leakage-resilient cryptography leakage model mutual information
2017/10/12
In recent years, many leakage-resilient schemes have been published. These schemes guarantee security against side-channel attacks given bounded leakage of the underlying primitive. However, it is a c...
The Internet of Things (IoT) has become a reality: small connected devices feature in everyday objects including childrens' toys, TVs, fridges, heating control units, etc. Supply chains feature sensor...
Attacking embedded ECC implementations through cmov side channels
ECC Montgomery ladder power analysis
2016/12/8
Side-channel attacks against implementations of elliptic-curve cryptography have been extensively studied in the literature and a large tool-set of countermeasures is available to thwart different att...
Side channels in deduplication: trade-offs between leakage and efficiency
cryptographic protocols Deduplication, storage
2016/12/8
Deduplication removes redundant copies of files or data blocks stored on the cloud. Client-side deduplication, where the client only uploads the file upon the request of the server, provides major sto...
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
side-channel attack elliptic curve cryptography electromagnetic analysis
2016/3/3
We show that elliptic-curve cryptography implementations on mobile devices are vulnerable
to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDSA
secret signing ke...
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
White-Box Side-Channel CPA
2016/2/26
Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its funda...
Amplifying Side Channels Through Performance Degradation
cryptanalysis side-channel ECDSA
2015/12/21
Interference between processes executing on shared
hardware can be used to mount performance-degradation attacks.
However, in most cases, such attacks offer little benefit for the
adversary. In thi...
Power and Timing Side Channels for PUFs and their Efficient Exploitation
Modeling Attacks Power Side Channel
2014/3/5
We discuss the first power and timing side channels on Strong Physical Unclonable Functions (Strong PUFs) in the literature, and describe their efficient exploitation via adapted machine learning (ML)...
We present CacheAudit, a versatile framework for the automatic, static analysis of cache side channels. CacheAudit takes as input a program binary and a cache configuration, and it derives formal, qua...
Electromagnetic Side Channels of an FPGA Implementation of AES
side channel attacks DEMA FPGA
2009/3/27
We show how to attack an FPGA implementation of AES
where all bytes are processed in parallel using differential electromagnetic
analysis. We first focus on exploiting local side channels to isolate...
A Note On Side-Channels Resulting From Dynamic Compilation
Side-Channels Resulting Dynamic Compilation
2008/12/23
Dynamic compilation systems are of fundamental importance
to high performance execution of interpreted languages such as
Java. These systems analyse the performance of an application at runtime
and...