Searched for: subject%3A%22Side%255C+Channel%255C+Attacks%22
(1 - 20 of 29)

Pages

document
Duroyon, Marin (author)
Acoustic side-channel attacks (SCAs) use audio produced by a system to bypass traditional security measures to extract sensitive information. Human interface devices, such as keyboards, have been the focus of such attacks, however, computer mice are input devices that are currently in a research gap. This paper explores the security risks the...
master thesis 2024
document
Muntenaar, Laura (author)
Demand for smart, Internet-connected devices and other electronics has increased dramatically in recent years. This increase in demand for technological devices, driven by advancements in Artificial Intelligence (AI), the Internet of Things (IoT), and autonomous systems, has exposed the digital system to potential security threats. As more...
master thesis 2023
document
Najm, Z. (author)
doctoral thesis 2023
document
Huang, Ruoyu (author)
Internet of Things (IoT) devices regularly process sensitive data, including personal information. Therefore, ensuring their security is crucial to avoid damage and prevent data breaches. The Advanced Encryption Standard (AES) is generally regarded as one of the most popular cryptographic algorithms for ensuring data security. Typical...
master thesis 2023
document
Perin, G. (author), Wu, L. (author), Picek, S. (author)
The adoption of deep neural networks for profiling side-channel attacks opened new perspectives for leakage detection. Recent publications showed that cryptographic implementations featuring different countermeasures could be broken without feature selection or trace preprocessing. This success comes with a high price: an extensive...
journal article 2023
document
Siddiqi, M.A. (author), Hernández, Jan Andrés Galvan (author), Gebregiorgis, A.B. (author), Bishnoi, R.K. (author), Strydis, C. (author), Hamdioui, S. (author), Taouil, M. (author)
Next-generation personalized healthcare devices are undergoing extreme miniaturization in order to improve user acceptability. However, such developments make it difficult to incorporate cryptographic primitives using available target tech-nologies since these algorithms are notorious for their energy consumption. Besides, strengthening these...
conference paper 2023
document
de Los Santos Subirats, Alex (author)
Software-Defined Networks (SDNs) are a promising new network design paradigm that allows for better control of the network. But as with any new software implementation, there are new security concerns that arise. In the past there have been various papers covering specific side-channel attacks on SDNs; most of them consist of either using time...
bachelor thesis 2022
document
Schijlen, Fiske (author)
Side-channel attacks (SCA) can obtain secret information related to the private key used during encryption executed on some device by exploiting leakage in power traces produced by the device. In recent years, researchers found that a neural network (NN) can be employed to execute a powerful profiled SCA, even on targets protected with...
master thesis 2022
document
Cassano, Luca (author), Di Mascio, S. (author), Palumbo, Alessandro (author), Menicucci, A. (author), Furano, Gianluca (author), Bianchi, Giuseppe (author), Ottavi, Marco (author)
Integrated circuits employed in space applications generally have very low-volume production and high performance requirements. Therefore, the adoption of Commercial-Off-The-Shelf (COTS) components and Third Party Intellectual Property cores (3PIPs) is of extreme interest to make system design, implementation and deployment cost-effective and...
conference paper 2022
document
Mukhtar, Naila (author), Batina, Lejla (author), Picek, S. (author), Kong, Yinan (author)
Deep learning-based side-channel analysis performance heavily depends on the dataset size and the number of instances in each target class. Both small and imbalanced datasets might lead to unsuccessful side-channel attacks. The attack performance can be improved by generating traces synthetically from the obtained data instances instead of...
conference paper 2022
document
Verrer, Daan (author)
Modern implementations of encryption algorithms on CPU’s that use frequent memory lookups of precomputed functions, are vulnerable to Cache based Side­Channel Attacks. The ρ­-VEX processor, a runtime reconfigurable VLIW processor developed at the Computer and Quantum Engineering department at the TU Delft was identified to possibly allow for...
master thesis 2021
document
Slooff, Tom (author)
One of the most potent attacks against cryptographic implementations nowadays is side-channel attacks. Side-channel attacks use unintended leakages in the implementation, for example, electromagnetic radiation, to retrieve the secret key. Over time side-channel attacks have become more powerful, and recently the community has shifted towards...
master thesis 2021
document
Swaminathan, Sudharshan (author)
Side-channel attacks (SCA) focus on vulnerabilities caused by insecure implementations and exploit them to deduce useful information about the data being processed or the data itself through leakages obtained from the device. There have been many studies exploiting these side-channel leakages, and most of the state-of-the-art attacks have been...
master thesis 2021
document
Korpas Kamarianos, Alexandros (author)
Over the last decades, side-channel attacks (SCAs) have been proven as a substantial weakness of cryptographic devices, while the recent growth of deep learning (DL) dramatically improved the performance of SCA. More and more researches present ways to build lightweight deep neural network (DNN) models that can retrieve the secret encryption key...
master thesis 2021
document
de Bruijn, Vasco (author)
In cyber security, side-channel attacks (SCA) are of interest because they target the vulnerabilities in implementation rather than inherent vulnerabilities in the algorithm. Profiled SCA is especially interesting as it assumes that the adversary has unlimited access to a clone device that can generate sufficient traces to create a profile of...
master thesis 2021
document
Aljuffri, A.A.M. (author), Zwalua, Marc (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author)
Side-channel attacks (SCAs) are powerful attacks that could be used to retrieve keys from electronic devices. Several physical leakage sources can be exploited in SCAs, such as power, time, heat, and so on. Heat is one of the side-channels that is not frequently analyzed by attackers in the literature due to the high noise associated with...
journal article 2021
document
Mulder, Doreen (author)
With the recent increase in computational power, deep learning is being applied in many different fields. Deep learning has produced promising results in the field of side-channel analysis. However, the algorithms used to construct deep neural networks remain black boxes, which makes it hard to fully employ the capabilities of attacks performed...
bachelor thesis 2020
document
Mariot, L. (author), Manzoni, Luca (author), Dennunzio, Alberto (author)
We continue the study of asynchrony immunity in cellular automata (CA), which can be considered as a generalization of correlation immunity in the case of vectorial Boolean functions. The property could have applications as a countermeasure for side-channel attacks in CA-based cryptographic primitives, such as S-boxes and pseudorandom number...
journal article 2020
document
Reinbrecht, Cezar (author), Aljuffri, A.A.M. (author), Hamdioui, S. (author), Taouil, M. (author), Forlin, Bruno E. (author), Sepulveda, Johanna (author)
Multi-Processor System-on-Chips (MPSoCs) are popular computational platforms for a wide variety of applications due to their energy efficiency and flexibility. Like many other platforms they are vulnerable to Side Channel Attacks (SCAs). In particular, Logical SCAs (LSCAs) are very powerful as sensitive information can be retrieved by simply...
conference paper 2020
document
Tubbing, Rico (author)
A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical leakages such as power consumption. In a profiled SCA, we assume an adversary has control over a target and copy device. Using the copy device the adversary learns a profile of the device. With the profile, the adversary exploits the measurements...
master thesis 2019
Searched for: subject%3A%22Side%255C+Channel%255C+Attacks%22
(1 - 20 of 29)

Pages