Benchmarking at the frontier of hardware security: Lessons from logic locking

B Tan, R Karri, N Limaye, A Sengupta… - arXiv preprint arXiv …, 2020 - arxiv.org
Integrated circuits (ICs) are the foundation of all computing systems. They comprise high-
value hardware intellectual property (IP) that are at risk of piracy, reverse-engineering, and …

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …

Simple key enumeration (and rank estimation) using histograms: An integrated approach

R Poussier, FX Standaert, V Grosso - … , Santa Barbara, CA, USA, August 17 …, 2016 - Springer
The main contribution of this paper, is a new key enumeration algorithm that combines the
conceptual simplicity of the rank estimation algorithm of Glowacz et al.(from FSE 2015) and …

Side-channel analysis against ANSSI's protected AES implementation on ARM: end-to-end attacks with multi-task learning

L Masure, R Strullu - Journal of Cryptographic Engineering, 2023 - Springer
In 2019, ANSSI released a protected software implementation of AES running on an STM32
platform with ARM Cortex-M architecture, publicly available on Github. The release of the …

How diversity affects deep-learning side-channel attacks

H Wang, M Brisfors, S Forsmark… - 2019 IEEE Nordic …, 2019 - ieeexplore.ieee.org
Deep learning side-channel attacks are an emerging threat to the security of
implementations of cryptographic algorithms. The attacker first trains a model on a large set …

Obfuscation revealed: Leveraging electromagnetic signals for obfuscated malware classification

DP Pham, D Marion, M Mastio, A Heuser - Proceedings of the 37th …, 2021 - dl.acm.org
The Internet of Things (IoT) is constituted of devices that are exponentially growing in
number and in complexity. They use numerous customized firmware and hardware, without …

On-Device Power Analysis Across Hardware Security Domains.: Stop Hitting Yourself.

C O'Flynn, A Dewar - IACR Transactions on Cryptographic Hardware …, 2019 - tches.iacr.org
Side-channel power analysis is a powerful method of breaking secure cryptographic
algorithms, but typically power analysis is considered to require specialized measurement …

Turn on, tune in, listen up: Maximizing side-channel recovery in time-to-digital converters

C Drewes, O Weng, K Ryan, B Hunter… - Proceedings of the …, 2023 - dl.acm.org
Voltage fluctuation sensors measure minute changes in an FPGA power distribution
network, allowing attackers to extract information from concurrently executing computations …

Analysis and improvements of the DPA contest v4 implementation

S Bhasin, N Bruneau, JL Danger, S Guilley… - Security, Privacy, and …, 2014 - Springer
DPA Contest is an international framework which allows researchers to compare their
attacks under a common setting. The latest version of DPA Contest proposes a software …

[HTML][HTML] SCInfer: Refinement-Based Verification of Software Countermeasures Against Side-Channel Attacks

J Zhang, P Gao, F Song, C Wang - International Conference on Computer …, 2018 - Springer
Power side-channel attacks, capable of deducing secret using statistical analysis
techniques, have become a serious threat to devices in cyber-physical systems and the …