C Wang, M Ninan, S Reilly, J Ward… - Proceedings of the 16th …, 2023 - dl.acm.org
Deep-learning side-channel attacks can reveal encryption keys on a device by analyzing power consumption with neural networks. However, the portability of deep-learning side …
H Li, M Ninan, B Wang… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Side-channel attacks leverage correlations between power consumption and intermediate encryption results to infer encryption keys. Recent studies show that deep learning offers …
Y Zhu, S Liu, L Yang, P Zhou - … of the Great Lakes Symposium on VLSI …, 2024 - dl.acm.org
In recent years, deep-learning side-channel attacks (DL-SCA) have gained increasing attention due to their enhanced efficacy against cryptographic modules. This paper explores …
P Smolovic, T Dahanayaka… - Proceedings of the 1st …, 2024 - dl.acm.org
There has been rampant propagation of fake news and misinformation videos on many platforms lately, and moderation of such content faces many challenges that must be …
Fingerprinting is a technique that identifies websites, software and devices by leveraging a group of information from users. An attacker can acquire users' secrets by only analyzing …