Sok: Design tools for side-channel-aware implementations

I Buhan, L Batina, Y Yarom, P Schaumont - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
Side-channel attacks that leak sensitive information through a computing device's interaction
with its physical environment have proven to be a severe threat to devices' security …

Towards automated detection of single-trace side-channel vulnerabilities in constant-time cryptographic code

F Erata, R Piskac, V Mateu… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Although cryptographic algorithms may be mathematically secure, it is often possible to leak
secret information from the implementation of the algorithms. Timing and power side …

SoK: The apprentice guide to automated fault injection simulation for security evaluation

A Adhikary, GT Petrucci, P Tanguy, V Lapôtre… - Cryptology ePrint …, 2024 - eprint.iacr.org
Identifying and mitigating vulnerable locations to fault injections requires significant
expertise and expensive equipment. Fault injections can damage hardware, cause software …

[图书][B] Competences in health network management: A textbook for training regional health network managers

Y Behrens, S Macher, Z Kollányi, I Morales Moreno… - 2022 - econstor.eu
[Introduction:] Health regions are clusters that unite regional competences around the topic
of health (Behrens, Movia 2020). In order to manage health regions successfully …

Análisis de seguridad de dispositivos hardware de firma de criptomonedas: el caso SeedSigner

J Pradas López - 2024 - ddd.uab.cat
Aquest article analitza la seguretat del SeedSigner, un dispositiu" faci'l vostè mateix" per a la
signatura de transaccions de Bitcoin, i avalua la seva resistència a atacs coneguts …

Guía de procedimientos para la extracción de datos en dispositivos móviles dañados

F Ferrari - 2023 - redi.ufasta.edu.ar
El objetivo de este trabajo es elaborar una guía para investigadores forenses especialistas
en dispositivos móviles, que los capacite en la extracción de datos de dispositivo que se …