31   Artículos

 
en línea
Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer    
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici    
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu    
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ali Asghar, Andreas Becher and Daniel Ziener    
Exchanging FPGA-based implementations of cryptographic algorithms during run-time using netlist randomized versions has been introduced recently as a unique countermeasure against side channel attacks. Using partial reconfiguration, it is possible to shu... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Luis Parrilla, Antonio García, Encarnación Castillo, Salvador Rodríguez-Bolívar and Juan Antonio López-Villanueva    
Power noise generation for masking power traces is a powerful countermeasure against Simple Power Analysis (SPA), and it has also been used against Differential Power Analysis (DPA) or Correlation Power Analysis (CPA) in the case of cryptographic circuit... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Karen Garcia Angulo and Kwan Tun Lee    
The Upper Amazon River forms an anabranching planform, which has been found to have significant changes in migration rate and river morphology. Previous studies have elaborated long-term evolution of the anabranching systems; however, research on the inf... ver más
Revista: Water    Formato: Electrónico

 
en línea
Weidong Guo, Lei Chen, Guoqiang Liu, Juntao Wang, Shaoshuai Shi and Lin Bu    
There are many issues affecting multi-hole parallel tunneling and long tunnel ventilation, such as insufficient fresh air supplied at the tunnel face, pollution by contaminated winds, and uncoordinated work among multiple fans. In view of these issues, t... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Lilian Bossuet and El Mehdi Benhani    
Cache attacks are widespread on microprocessors and multi-processor system-on-chips but have not yet spread to heterogeneous systems-on-chip such as SoC-FPGA that are found in increasing numbers of applications on servers or in the cloud. This type of So... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dimitrios Myridakis, Paul Myridakis and Athanasios Kakarountas    
Recently, there has been a sharp increase in the production of smart devices and related networks, and consequently the Internet of Things. One concern for these devices, which is constantly becoming more critical, is their protection against attacks due... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Bikash Poudel, Arslan Munir, Joonho Kong and Muazzam A. Khan    
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication compon... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »