Graph-based statistical language model for code

AT Nguyen, TN Nguyen - 2015 IEEE/ACM 37th IEEE …, 2015 - ieeexplore.ieee.org
n-gram statistical language model has been successfully applied to capture programming
patterns to support code completion and suggestion. However, the approaches using n …

A countermeasure against statistical ineffective fault analysis

J Breier, M Khairallah, X Hou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Current state-of-the-art countermeasures against Fault Injection Attacks (FIA) provide good
protection against analysis methods that require the differences in the correct and faulty …

Side-channel attack on STTRAM based cache for cryptographic application

MNI Khan, S Bhasin, A Yuan… - … on Computer Design …, 2017 - ieeexplore.ieee.org
In this paper, we propose a Side Channel Attack (SCA) model on Spin-Torque Transfer RAM
(STTRAM) where an adversary can monitor the supply current of the memory array …

Comprehensive study of side-channel attack on emerging non-volatile memories

MNI Khan, S Bhasin, B Liu, A Yuan… - Journal of Low Power …, 2021 - mdpi.com
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer
Torque RAM (STTRAM), Phase Change Memory (PCM) and Resistive RAM (RRAM) are …

Bitsliced masking and ARM: Friends or foes?

W de Groot, K Papagiannopoulos… - … for Security and Privacy …, 2017 - Springer
Software-based cryptographic implementations can be vulnerable to side-channel analysis.
Masking countermeasures rank among the most prevalent techniques against it, ensuring …

Security is an architectural design constraint

P Ravi, Z Najm, S Bhasin, M Khairallah… - Microprocessors and …, 2019 - Elsevier
In state-of-the-art design paradigm, time, space and power efficiency are considered the
primary design constraints. Quite often, this approach adversely impacts the security of the …

On a side channel and fault attack concurrent countermeasure methodology for MCU-based byte-sliced cipher implementations

E Aerabi, A Papadimitriou… - 2019 IEEE 25th …, 2019 - ieeexplore.ieee.org
As IoT applications are increasingly being deployed, there comes along an ever increasing
need for the security and privacy of the involved data. Since cryptographic implementations …

Sécurisation de programmes assembleur face aux attaques visant les processeurs embarqués

N Moro - 2014 - theses.hal.science
Cette thèse s' intéresse à la sécurité des programmes embarqués face aux attaques par
injection de fautes. La prolifération des composants embarqués et la simplicité de mise en …

Another Look at Side-Channel-Resistant Encoding Schemes

X Hou, J Breier, M Kovačević - IEEE Transactions on Very …, 2024 - ieeexplore.ieee.org
The idea of balancing the side-channel leakage in software was proposed more than a
decade ago. Just like with other hiding-based countermeasures, the goal is not to hide the …

Automatic application of software countermeasures against physical attacks

N Belleville, K Heydemann, D Couroussé… - Cyber-Physical Systems …, 2018 - Springer
While the number of embedded systems is continuously increasing, securing software
against physical attacks is costly and error-prone. Several works proposed solutions that …