X-DeepSCA: Cross-device deep learning side channel attack

D Das, A Golder, J Danial, S Ghosh… - Proceedings of the 56th …, 2019 - dl.acm.org
This article, for the first time, demonstrates Cross-device Deep Learning Side-Channel
Attack (X-DeepSCA), achieving an accuracy of> 99.9%, even in presence of significantly …

Information leaks without memory disclosures: Remote side channel attacks on diversified code

J Seibert, H Okhravi, E Söderström - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Code diversification has been proposed as a technique to mitigate code reuse attacks,
which have recently become the predominant way for attackers to exploit memory corruption …

Neural network based attack on a masked implementation of AES

R Gilmore, N Hanley, M O'Neill - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Masked implementations of cryptographic algorithms are often used in commercial
embedded cryptographic devices to increase their resistance to side channel attacks. In this …

{Collide+ Power}: Leaking Inaccessible Data with Software-based Power Side Channels

A Kogler, J Juffinger, L Giner, L Gerlach… - 32nd USENIX Security …, 2023 - usenix.org
Differential Power Analysis (DPA) measures single-bit differences between data values
used in computer systems by statistical analysis of power traces. In this paper, we show that …

G2F: A secure user authentication for rapid smart home IoT management

H Luo, C Wang, H Luo, F Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices are widely deployed nowadays. A large number of smart
home IoT devices are hosted on a cloud server for easy management. Users can use their …

PARAM: A microprocessor hardened for power side-channel attack resistance

MA KF, V Ganesan, R Bodduna… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The power consumption of a microprocessor is a huge channel for information leakage.
While the most popular exploitation of this channel is to recover cryptographic keys from …

Let's take it offline: Boosting brute-force attacks on iPhone's user authentication through SCA

O Lisovets, D Knichel, T Moos, A Moradi - IACR Transactions on …, 2021 - tches.iacr.org
In recent years, smartphones have become an increasingly important storage facility for
personal sensitive data ranging from photos and credentials up to financial and medical …

SoK:" Plug & Pray" today–understanding USB insecurity in versions 1 through C

J Tian, N Scaife, D Kumar, M Bailey… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
USB-based attacks have increased in complexity in recent years. Modern attacks now
incorporate a wide range of attack vectors, from social engineering to signal injection. To …

Turn on, tune in, listen up: Maximizing side-channel recovery in time-to-digital converters

C Drewes, O Weng, K Ryan, B Hunter… - Proceedings of the …, 2023 - dl.acm.org
Voltage fluctuation sensors measure minute changes in an FPGA power distribution
network, allowing attackers to extract information from concurrently executing computations …

Microcontrollers as (in) security devices for pervasive computing applications

D Strobel, D Oswald, B Richter… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Often overlooked, microcontrollers are the central component in embedded systems which
drive the evolution toward the Internet of Things (IoT). They are small, easy to handle, low …