Sciweavers

126 search results - page 12 / 26
» Power Analysis of FPGAs: How Practical is the Attack
Sort
View
AIM
2002
13 years 6 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
HOST
2008
IEEE
14 years 1 months ago
Slicing Up a Perfect Hardware Masking Scheme
—Masking is a side-channel countermeasure that randomizes side-channel leakage, such as the power dissipation of a circuit. Masking is only effective on the condition that the in...
Zhimin Chen, Patrick Schaumont
NSDI
2008
13 years 9 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...
CHES
2008
Springer
260views Cryptology» more  CHES 2008»
13 years 8 months ago
Mutual Information Analysis
We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et ...
Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart ...
CISS
2008
IEEE
14 years 1 months ago
Secure transmission power of cognitive radios for dynamic spectrum access applications
—One of the major concerns of cognitive radios when used for secondary spectrum access is the potential of interfering primary users, considering especially that cognitive radios...
Xiaohua Li, Jinying Chen, Fan Ng