Power-Based Side-Channel Attacks on Program Control Flow with Machine Learning Models
The control flow of a program represents valuable and sensitive information; in embedded systems, this information can take on even greater value as the resources, control flow, and execution of the system have more constraints and functional implications than modern desktop environments. Early work...
Main Authors: | Andey Robins, Stone Olguin, Jarek Brown, Clay Carper, Mike Borowczak |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-07-01
|
Series: | Journal of Cybersecurity and Privacy |
Subjects: | |
Online Access: | https://www.mdpi.com/2624-800X/3/3/18 |
Similar Items
-
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
by: Clay Carper, et al.
Published: (2023-11-01) -
Deep Learning Side-Channel Collision Attack
by: Marvin Staib, et al.
Published: (2023-06-01) -
Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture
by: Adel N. Alahmadi, et al.
Published: (2022-05-01) -
Combined Side Channel Attacks: breaking COMP128
by: Alla Borisovna Levina, et al.
Published: (2014-09-01) -
A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis
by: Petr Socha, et al.
Published: (2022-10-01)