Sciweavers

525 search results - page 5 / 105
» The Davies-Murphy Power Attack
Sort
View
CCS
2011
ACM
12 years 9 months ago
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs
Over the last two decades FPGAs have become central components for many advanced digital systems, e.g., video signal processing, network routers, data acquisition and military sys...
Amir Moradi, Alessandro Barenghi, Timo Kasper, Chr...
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 9 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...
ARC
2006
Springer
105views Hardware» more  ARC 2006»
14 years 1 months ago
Updates on the Security of FPGAs Against Power Analysis Attacks
François-Xavier Standaert, François ...
IJBC
2007
51views more  IJBC 2007»
13 years 9 months ago
Topological Vulnerability of the European Power Grid under Errors and Attacks
Martí Rosas-Casals, Sergi Valverde, Ricard ...
ACSAC
2004
IEEE
14 years 1 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller