Leakyohm: Secret bits extraction using impedance analysis

SK Monfared, T Mosavirik, S Tajik - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The threats of physical side-channel attacks and their countermeasures have been widely
researched. Most physical side-channel attacks rely on the unavoidable influence of …

Active wire fences for multitenant FPGAs

O Glamočanin, A Kostić, S Kostić… - 2023 26th International …, 2023 - ieeexplore.ieee.org
When spatially shared among multiple tenants, field-programmable gate arrays (FPGAs) are
vulnerable to remote power side-channel analysis attacks. Using carefully crafted on-chip …

Temperature impact on remote power side-channel attacks on shared fpgas

O Glamočanin, H Bazaz, M Payer… - … Design, Automation & …, 2023 - ieeexplore.ieee.org
To answer the growing demand for hardware acceleration, Amazon, Microsoft, and many
other major cloud service providers have included field-programmable gate arrays (FPGAs) …

High-Performance Design Patterns and File Formats for Side-Channel Analysis

J Bosland, S Ene, P Baumgartner… - IACR Transactions on …, 2024 - tches.iacr.org
Data and instruction dependent power consumption can reveal cryptographic secrets by
means of Side-Channel Analysis (SCA). Consequently, manufacturers and evaluation labs …

Locking-enabled security analysis of cryptographic circuits

D Upadhyaya, M Gay, I Polian - Cryptography, 2024 - mdpi.com
Hardware implementations of cryptographic primitives require protection against physical
attacks and supply chain threats. This raises the question of secure composability of different …

TinyPower: Side-Channel Attacks with Tiny Neural Networks

H Li, M Ninan, B Wang… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Side-channel attacks leverage correlations between power consumption and intermediate
encryption results to infer encryption keys. Recent studies show that deep learning offers …

A Second Look at the Portability of Deep Learning Side-Channel Attacks over EM Traces

M Ninan, E Nimmo, S Reilly, C Smith, W Sun… - Proceedings of the 27th …, 2024 - dl.acm.org
Deep learning side-channel attacks can recover encryption keys on a target by analyzing
power consumption or electromagnetic (EM) signals. However, they are less portable when …

Practical Implementations of Remote Power Side-Channel and Fault-Injection Attacks on Multitenant FPGAs

DG Mahmoud, O Glamočanin, F Regazzoni… - Security of FPGA …, 2023 - Springer
Cloud computing environments increasingly provision FPGAs because of their fine-grained,
highly parallel, and flexible hardware architecture. The availability of FPGAs in the cloud …

Profiled Side Channel Power Attack on Charge Balancing Symmetric Pre‐Resolve Adiabatic Logic PRESENT S‐Box Using Convolutional Neural Networks

AJ Banu, A Prathiba, S Shyam Krishna… - Smart Grids as …, 2024 - Wiley Online Library
Cipher implementations offering security to smart grid infrastructure are vulnerable to the
side channel attacks; the most popular being is the power analysis attack. Circuit level …

Optimising security, power consumption and performance of embedded systems

P Rahimi - 2024 - repository.essex.ac.uk
Increased interest in multicore systems has led to significant advancements in computing
power, but it has also introduced new security risks due to covert channel communication …