AirTag of the clones: shenanigans with liberated item finders

T Roth, F Freyer, M Hollick… - 2022 IEEE Security and …, 2022 - ieeexplore.ieee.org
AirTags are the first standalone devices that support Apple's Find My network. Besides being
a low-cost item finder, they provide an exciting research platform into Apple's ecosystem …

Improving CPU Fault Injection Simulations: Insights from RTL to Instruction-Level Models

J van Woudenberg, R Velegalati… - 2024 Workshop on …, 2024 - ieeexplore.ieee.org
Fault injection simulators are essential tools for evaluating the robustness of software
programs against hardware faults. Instruction-level simulators offer high speed but lack …

Enhancing Thermal Security of 3D-SiP Systems through Thermal Digital Twin (TDT)

AZ Benelhaouare, A Oukaira, M Oumlaz… - 2024 IEEE Canadian …, 2024 - ieeexplore.ieee.org
Thermal attacks targeting large-scale integrated microsystems, such as three-dimensional
package systems (3D-SiP), exploit thermal fluctuations to compromise their security. These …

PACCOR4ESP: Embedded Device Security Attestation using Platform Attribute Certificates

T Grübl, J von der Assen, M Knecht, B Stiller - arXiv preprint arXiv …, 2024 - arxiv.org
Verifying the integrity of embedded device characteristics is required to ensure secure
operation of a device. One central challenge is to securely extract and store device-specific …

Penetration Testing of an In-Vehicle Infotainment System

P Andersson - 2022 - diva-portal.org
With the growing demand for smart and luxurious vehicles, the automotive industry has
moved toward developing technologies to enhance the in-vehicle user experience. As a …

Recognition of block cipher algorithms based on radiated emission

K Szczepankiewicz, M Wnuk - 2024 International Symposium …, 2024 - ieeexplore.ieee.org
The paper describes the emissions radiated from integrated circuits when the ICs perform
block encryption operations The article briefly describes several of the most popular block …

[PDF][PDF] Isogeny-based key agreement: Optimizations, secure implementation, and applications

FF Campos - 2023 - repository.ubn.ru.nl
The security of public-key protocols widely deployed today relies on the hardness of the
integer factorization problem and the discrete logarithm problem. Due to Shor's algorithm …

From minutes to millennia: enhancing power analysis resistance in AES and ASCON

M Castagno - 2024 - webthesis.biblio.polito.it
Cryptographic algorithms are an important pillar in the digital world because they protect the
content of sensitive data ensuring security in communication. Their strength lies in the …

[PDF][PDF] Unraveling Side-Channel Analysis: Efficient evaluation of embedded devices against (portable) profiling attacks

U Rioja Sabando - 2022 - repository.ubn.ru.nl
Embedded systems are specialized platforms consisting of hardware and software used in a
wide range of domains. In recent years, we have witnessed a substantial increase due to the …

[PDF][PDF] SIDE CHANNEL ATTACK PERFORMANCE OF CORRELATION POWER ANALYSIS METHOD IN NOISE.

F Garipay, K Uzgören, İ Kaya - International Journal on Information …, 2023 - ijits-bg.com
This article explores the use of artificial noise to defend against power analysis and power
analysis-based side-channel attacks on AES encryption. The study covers both hardware …