A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics

A Sayakkara, NA Le-Khac, M Scanlon - Digital Investigation, 2019 - Elsevier
The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their
pertinence to digital forensic investigations will increase into the foreseeable future. These …

SoK: Exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation

X Du, C Hargreaves, J Sheppard, F Anda… - Proceedings of the 15th …, 2020 - dl.acm.org
Multi-year digital forensic backlogs have become commonplace in law enforcement
agencies throughout the globe. Digital forensic investigators are overloaded with the volume …

Capacity of the em covert/side-channel created by the execution of instructions in a processor

BB Yilmaz, RL Callan, M Prvulovic… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The goal of this paper is to answer how much information is “transmitted” by the execution of
particular sequence of instructions in a processor. Introducing such a measure would …

Quantifying information leakage in a processor caused by the execution of instructions

BB Yilmaz, R Callan, M Prvulovic… - MILCOM 2017-2017 …, 2017 - ieeexplore.ieee.org
Covert/side channel attacks based on electromagnetic (EM) emanations are difficult to
detect because they are practiced wirelessly. Hence, quantifying information leakage is …

Electromagnetic side-channel analysis methods for digital forensics on internet of things

AP Sayakkara - 2020 - researchrepository.ucd.ie
Modern legal and corporate investigations heavily rely on the field of digital forensics to
uncover vital evidence. The dawn of the Internet of Things (IoT) devices has expanded this …

[图书][B] Using Blinking to Mitigate Passive Side Channel Attacks and Fault Attacks

J Blackstone - 2021 - search.proquest.com
Ignoring security concerns when building digital hardware allows for malicious parties to
take advantage of vulnerabilities to gain access to secret information and manipulate …