Search

Your search keyword '"Side-channels"' showing total 87 results

Search Constraints

Start Over You searched for: Descriptor "Side-channels" Remove constraint Descriptor: "Side-channels"
87 results on '"Side-channels"'

Search Results

1. Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers

2. TeeJam: Sub-Cache-Line Leakages Strike Back

3. A Side-Channel Based Disassembler for the ARM-Cortex M0

4. A Fast and Compact RISC-V Accelerator for Ascon and Friends

5. Software Diversification for WebAssembly

6. An Efficient and Provable Masked Implementation of qTESLA

7. A generalized approach to estimation of memoryless covert channel information leakage capacity

8. REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals.

9. ReCon : Efficient Detection, Management, and Use of Non-Speculative Information Leakage

10. On Certificate Transparency Verification and Unlinkability of Websites Visited by Tor Users

11. Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache

12. Delay-on-Squash: Stopping Microarchitectural Replay Attacks in Their Tracks

13. Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems

14. Architectural Support for Securing Systems Against Software Vulnerabilities

15. Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

16. Masking Feedforward Neural Networks Against Power Analysis Attacks

17. Delay-on-Squash : Stopping Microarchitectural Replay Attacks in Their Tracks

18. Secure Compilation (Dagstuhl Seminar 21481)

19. Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults

20. enSecure Compilation (Dagstuhl Seminar 21481)

21. Compilation vérifiée et sécurisée contre les canaux cachés temporels

22. Solver-Aided Constant-Time Hardware Verification

23. Alluviation of a side-channel by bed material load: field measurements and modelling

24. Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs.

25. Evaluating Hamming Distance as a CRC-based Side-channel Detection Measure in Wi-Fi Networks.

26. Towards attack-tolerant trusted execution environments : Secure remote attestation in the presence of side channels

27. Alluviation of a side-channel by bed material load: field measurements and modelling

28. Tracking Anonymized Bluetooth Devices

29. vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms

30. Cyber-Physical Security for Additive Manufacturing Systems

31. Detecção de ataques por canais laterais na camada física

32. Cyber reconnaissance techniques

33. A Tale of TwoWorlds: Assessing the Vulnerability of Enclave Shielding Runtimes

34. Recommendations for a radically secure ISA

36. RIDL: Rogue in-flight data load

37. RIDL: Rogue In-Flight Data Load

38. Vérification d'implémentations constant-time dans une chaîne de compilation vérifiée

39. Alluviation of a side-channel by bed material load. Field measurements and modelling.

40. Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

41. Secure Compilation (Dagstuhl Seminar 18201)

42. Securing Compilation Against Memory Probing

43. Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

44. Security and Privacy Threats on Mobile Devices through Side-Channels Analysis

45. Hardware Security Threat and Mitigation Techniques for Network-on-Chips

46. Side Channel Analysis Using a Model Counting Constraint Solver and Symbolic Execution (Invited Talk)

47. OJIT: A Novel Obfuscation Approach Using Standard Just-In-Time Compiler Transformations

48. Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations

49. Layout Dependent Phenomena A New Side-channel Power Model

50. Private Communication Detection via Side-Channel Attacks

Catalog

Books, media, physical & digital resources