Search

Your search keyword '"side-channel"' showing total 19 results

Search Constraints

Start Over You searched for: Descriptor "side-channel" Remove constraint Descriptor: "side-channel" Publisher ieee Remove constraint Publisher: ieee
19 results on '"side-channel"'

Search Results

1. Profiling Running Applications in Connected Devices Through Side-Channel and Machine Learning Techniques

2. Intrusion Detection for IoT Environments Through Side-Channel and Machine Learning Techniques

3. Microarchitectural Side-Channel Threats, Weaknesses and Mitigations: A Systematic Mapping Study

4. A Hierarchical Approach for Multiple Periodicity Detection in Software Code Analysis

5. Fit the Joint Moments: How to Attack Any Masking Scheme

6. A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks

7. Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID.

8. Area-Time Efficient Hardware Architecture for Signature Based on Ed448.

9. aLeak: Context-Free Side-Channel from Your Smart Watch Leaks Your Typing Privacy.

10. From Lens to Prism: Device-Free Modeling and Recognition of Multi-Part Activities

11. An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications.

12. Enabling Out-of-Band Coordination of Wi-Fi Communications on Smartphones.

13. A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks

14. Side-Channel Analysis of Grøstl and Skein.

15. Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel

16. ConfMVM: A Hardware-Assisted Model to Confine Malicious VMs

17. Cache Storage Channels: Alias-Driven Attacks and Verified Countermeasures

18. Leakage Power Analysis attacks against a bit slice implementation of the Serpent block cipher

19. Leakage-Resilient Cryptography

Catalog

Books, media, physical & digital resources