Leakage assessment methodology: Extended version

T Schneider, A Moradi - Journal of Cryptographic Engineering, 2016 - Springer
Evoked by the increasing need to integrate side-channel countermeasures into security-
enabled commercial devices, evaluation labs are seeking a standard approach that enables …

Breaking Mifare DESFire MF3ICD40: Power analysis and templates in the real world

D Oswald, C Paar - … on Cryptographic Hardware and Embedded Systems, 2011 - Springer
With the advent of side-channel analysis, implementations of mathematically secure ciphers
face a new threat: by exploiting the physical characteristics of a device, adversaries are able …

Mutual information analysis: how, when and why?

N Veyrat-Charvillon, FX Standaert - International Workshop on …, 2009 - Springer
Abstract The Mutual Information Analysis (MIA) is a generic side-channel distinguisher that
has been introduced at CHES 2008. This paper brings three contributions with respect to its …

Microwalk: A framework for finding side channels in binaries

J Wichelmann, A Moghimi, T Eisenbarth… - Proceedings of the 34th …, 2018 - dl.acm.org
Microarchitectural side channels expose unprotected software to information leakage
attacks where a software adversary is able to track runtime behavior of a benign process …

DP-TrajGAN: A privacy-aware trajectory generation model with differential privacy

J Zhang, Q Huang, Y Huang, Q Ding… - Future Generation …, 2023 - Elsevier
Abstract Open Data Processing Services (ODPS) offers vast storage capacity and excellent
efficiency, which collects and stores a lot of data. As an essential component of ODPS …

Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era

DG Mahmoud, V Lenders, M Stojilović - ACM Computing Surveys (CSUR …, 2022 - dl.acm.org
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …

Horizontal collision correlation attack on elliptic curves: –Extended Version–

A Bauer, É Jaulmes, E Prouff, JR Reinhard… - Cryptography and …, 2015 - Springer
Elliptic curves based algorithms are nowadays widely spread among embedded systems.
They indeed have the double advantage of providing efficient implementations with short …

{DATA}–differential address trace analysis: Finding address-based {Side-Channels} in binaries

S Weiser, A Zankl, R Spreitzer, K Miller… - 27th USENIX Security …, 2018 - usenix.org
Cryptographic implementations are a valuable target for address-based side-channel
attacks and should, thus, be protected against them. Countermeasures, however, are often …

RTL-PSC: Automated power side-channel leakage assessment at register-transfer level

M He, J Park, A Nahiyan, A Vassilev… - 2019 IEEE 37th VLSI …, 2019 - ieeexplore.ieee.org
Power side-channel attacks (SCAs) have become a major concern to the security community
due to their noninvasive feature, low-cost, and effectiveness in extracting secret information …

PROLEAD: A probing-based hardware leakage detection tool

N Müller, A Moradi - IACR Transactions on Cryptographic Hardware …, 2022 - tches.iacr.org
Abstract Even today, Side-Channel Analysis attacks pose a serious threat to the security of
cryptographic implementations fabricated with low-power and nanoscale feature …