-
1
A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis
Published 2022-10-01Subjects: “…side-channel analysis…”
Get full text
Article -
2
CacheHawkeye: Detecting Cache Side Channel Attacks Based on Memory Events
Published 2022-01-01Subjects: Get full text
Article -
3
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
Published 2020-01-01Subjects: Get full text
Article -
4
Weakly Profiling Side-channel Analysis
Published 2024-11-01Subjects: “…Weakly profiling side-channel analysis…”
Get full text
Article -
5
A Taxonomy-Based Survey of EM-SCA and Implications for Multi-Robot Systems
Published 2024-01-01Subjects: “…Electromagnetic side-channel analysis…”
Get full text
Article -
6
-
7
Compress: Generate Small and Fast Masked Pipelined Circuits
Published 2024-07-01Subjects: “…Side-channel…”
Get full text
Article -
8
Effective side-channel analysis: exploiting new leakages on cryptography circuits secured with side-channel countermeasures
Published 2024Subjects: Get full text
Thesis-Doctor of Philosophy -
9
Exploiting FPGA Block Memories for Protected Cryptographic Implementations
Published 2016Subjects: Get full text
Get full text
Journal Article -
10
Ransomware Classification Using Hardware Performance Counters on a Non-Virtualized System
Published 2024-01-01Subjects: Get full text
Article -
11
-
12
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01Subjects: Get full text
Article -
13
Domain-Agnostic Representation of Side-Channels
Published 2024-08-01Subjects: “…side-channel sensing…”
Get full text
Article -
14
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01Subjects: “…memory order buffer;microarchitectural side-channel vulnerability;OpenSSL AES;timing side-channel…”
Get full text
Article -
15
Implementation of Disassembler on Microcontroller Using Side-Channel Power Consumption Leakage
Published 2022-08-01Subjects: Get full text
Article -
16
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis
Published 2023-11-01Subjects: Get full text
Article -
17
Fit the Joint Moments: How to Attack Any Masking Scheme
Published 2022-01-01Subjects: “…Side-channel…”
Get full text
Article -
18
Risky Translations: Securing TLBs against Timing Side Channels
Published 2022-11-01Subjects: Get full text
Article -
19
Quantile: Quantifying Information Leakage
Published 2023-12-01Subjects: “…Side-channel attacks…”
Get full text
Article -
20
Highly secured arithmetic hiding based S-Box on AES-128 implementation
Published 2017Subjects: “…Side-Channel Attack…”
Get full text
Get full text
Conference Paper