We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 66 results
  1. Like an Open Book? Read Neural Network Architecture with Simple Power Analysis on 32-Bit Microcontrollers

    Model extraction is a growing concern for the security of AI systems. For deep neural network models, the architecture is the most important...
    Raphaël Joud, Pierre-Alain Moëllic, ... Jean-Baptiste Rigaud in Smart Card Research and Advanced Applications
    Conference paper 2024
  2. Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF

    Physically unclonable functions (PUFs) are assumed to provide high tamper resistance against counterfeiting and hardware attacks since PUFs extract...

    Mitsuru Shiozaki, Takeshi Fu**o in Journal of Cryptographic Engineering
    Article 03 September 2020
  3. Simple Electromagnetic Analysis Against Activation Functions of Deep Neural Networks

    From cloud computing to edge computing, the deployment of artificial intelligence (AI) has been evolving to fit a wide range of applications....
    Go Takatoi, Takeshi Sugawara, ... Yang Li in Applied Cryptography and Network Security Workshops
    Conference paper 2020
  4. CNN Architecture Extraction on Edge GPU

    Neural networks have become popular due to their versatility and state-of-the-art results in many applications, such as image classification, natural...
    Péter Horváth, Lukasz Chmielewski, ... Yuval Yarom in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  5. Traditional Machine Learning Methods for Side-Channel Analysis

    Traditional machine learning techniques (excluding deep learning) include a range of approaches, such as supervised, semi-supervised, and...
    Alan Jovic, Dirmanto Jap, ... Annelie Heuser in Security and Artificial Intelligence
    Chapter 2022
  6. What Is an Analog Side Channel?

    This chapter introduces the concept of analog side channels and discusses how they can be categorized.
    Chapter 2023
  7. S-box Pooling: Towards More Efficient Side-Channel Security Evaluations

    Nowadays, profiled attacks are the standard penetration tests for security evaluations. Often the security evaluators have to perform profiled...
    Yuanyuan Zhou, François-Xavier Standaert in Applied Cryptography and Network Security Workshops
    Conference paper 2022
  8. Parasite: Mitigating Physical Side-Channel Attacks Against Neural Networks

    Neural Networks (NNs) are now the target of various side-channel attacks whose aim is to recover the model’s parameters and/or architecture. We focus...
    Hervé Chabanne, Jean-Luc Danger, ... Ulrich Kühne in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2022
  9. Tuning Neural Networks for Superior Accuracy on Resource-Constrained Edge Microcontrollers

    The approaches to tune Artificial neural networks (ANN) for running on edge devices, such as weight quantization, knowledge distillation, weight...
    Alexandre M. Nascimento, Vinícius V. de Melo, Márcio P. Basgalupp in ITNG 2023 20th International Conference on Information Technology-New Generations
    Conference paper 2023
  10. Horizontal Attacks Against ECC: From Simulations to ASIC

    In this paper we analyse the impact of different compile options on the success rate of side channel analysis attacks. We run horizontal differential...
    Ievgen Kabin, Zoya Dyka, ... Peter Langendoerfer in Computer Security
    Conference paper 2020
  11. Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures

    Side-channels are unintended pathways within target systems that leak internal information, exploitable via side-channel attack techniques that...

    Aaron Spence, Shaun Bangay in International Journal of Information Security
    Article 28 August 2021
  12. A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding

    At Eurocrypt 2022, May et al. proposed a partial key exposure (PKE) attack on CRT-RSA that efficiently factors N knowing only a...
    Yuanyuan Zhou, Joop van de Pol, ... François-Xavier Standaert in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  13. How to Develop ECC-Based Low Cost RFID Tags Robust Against Side-Channel Attacks

    Radio Frequency Identification (RFID) tags using asymmetric cryptography are more and more proposed to solve the well-known issue of symmetric-based...
    Manh-Hiep Dao, Vincent Beroulle, ... Xuan-Tu Tran in Industrial Networks and Intelligent Systems
    Conference paper 2021
  14. Concept of Model

    In this chapter, we provide a discussion about model types and related topics. A more detailed discussion about these concepts can be found in the...
    Stanislaw Raczynski in Models for Research and Understanding
    Chapter 2022
  15. Scatter: a Missing Case?

    Scatter is a multivariate transform proposed in combination with the Chi...
    Yuanyuan Zhou, Sébastien Duval, François-Xavier Standaert in Constructive Side-Channel Analysis and Secure Design
    Conference paper 2021
  16. Firmware Secure Coding Practice

    After we finish the security architecture and design, we need to bring security into the development phase. On the one hand, firmware is still a type...
    Jiewen Yao, Vincent Zimmer in Building Secure Firmware
    Chapter 2020
  17. Physical security in the post-quantum era

    Over the past decades, quantum technology has seen consistent progress, with notable recent developments in the field of quantum computers....

    Sreeja Chowdhury, Ana Covic, ... Domenic Forte in Journal of Cryptographic Engineering
    Article 01 February 2021
  18. A Taxonomy of Side Channel Attacks on Critical Infrastructures and Relevant Systems

    Information disclosure leads to serious exploits, disruption or damage of critical operations and privacy breaches, both in Critical Infrastructures...
    Nick Tsalis, Efstratios Vasilellis, ... Theodore Apostolopoulos in Critical Infrastructure Security and Resilience
    Chapter 2019
  19. Applications of machine learning techniques in side-channel attacks: a survey

    With increasing expansion of the Internet of Things, embedded devices equipped with cryptographic modules become an important factor to protect...

    Benjamin Hettwer, Stefan Gehrer, Tim Güneysu in Journal of Cryptographic Engineering
    Article 11 April 2019
  20. A Framework for Acquiring and Analyzing Traces from Cryptographic Devices

    We present a Side-Channel Analysis Platform (SCAP) Framework developed to acquire and study the traces derived from a cryptographic device when...
    Alfonso Blanco Blanco, Jose María de Fuentes, ... J. Ignacio Sánchez García in Security and Privacy in Communication Networks
    Conference paper 2018
Did you find what you were looking for? Share feedback.