|
|
|
Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, o...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
The growth of the Internet of Things (IoT) has led to a significant rise in cyber attacks and an expanded attack surface for the average consumer. In order to protect consumers and infrastructure, research into detecting malicious IoT activity must be of...
ver más
|
|
|
|
|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon...
ver más
|
|
|
|
|
|
|
Guilherme Perin, Lichao Wu and Stjepan Picek
The adoption of deep neural networks for profiling side-channel attacks opened new perspectives for leakage detection. Recent publications showed that cryptographic implementations featuring different countermeasures could be broken without feature selec...
ver más
|
|
|
|
|
|
|
Qihong Yu, Jiguo Li and Sai Ji
In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the security of cryptographic systems. Since no existing anonymous broadcast encryption scheme can resist the si...
ver más
|
|
|
|
|
|
|
Lilian Bossuet and El Mehdi Benhani
Cache attacks are widespread on microprocessors and multi-processor system-on-chips but have not yet spread to heterogeneous systems-on-chip such as SoC-FPGA that are found in increasing numbers of applications on servers or in the cloud. This type of So...
ver más
|
|
|
|
|
|
|
Mohammad Nasim Imtiaz Khan, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay and Swaroop Ghosh
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM), Phase Change Memory (PCM) and Resistive RAM (RRAM) are very promising due to their low (static) power operation, high scalability and high performance. ...
ver más
|
|
|
|
|
|
|
Somdip Dey, Amit Kumar Singh and Klaus McDonald-Maier
Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation f...
ver más
|
|
|
|
|
|
|
Dimitrios Myridakis, Paul Myridakis and Athanasios Kakarountas
Recently, there has been a sharp increase in the production of smart devices and related networks, and consequently the Internet of Things. One concern for these devices, which is constantly becoming more critical, is their protection against attacks due...
ver más
|
|
|
|