Search

Your search keyword '"side channels"' showing total 186 results

Search Constraints

Start Over You searched for: Descriptor "side channels" Remove constraint Descriptor: "side channels"
186 results on '"side channels"'

Search Results

1. Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript

2. Revealing CNN Architectures via Side-Channel Analysis in Dataflow-based Inference Accelerators.

3. Beat the Heat: Syscall Attack Detection via Thermal Side Channel.

4. 3D printer audio and vibration side channel dataset for vulnerability research in additive manufacturing securityzenodo.org

6. Joint Eavesdropping on the BB84 Decoy State Protocol with an Arbitrary Passive Light-source Side Channel.

7. Generic SCARE: reverse engineering without knowing the algorithm nor the machine.

8. Declining geomorphic diversity and potential adaptive management opportunities on a highly regulated reach of the Bighorn River, Montana.

9. Beat the Heat: Syscall Attack Detection via Thermal Side Channel

10. Embedded Watermarks

11. CPU Port Contention Without SMT

12. Black-box security : measuring black-box information leakage via machine learning

13. Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention.

14. Detecting control system misbehavior by fingerprinting programmable logic controller functionality

15. Detecting control system misbehavior by fingerprinting programmable logic controller functionality

16. Attestation Waves: Platform Trust via Remote Power Analysis

17. An Investigation of Microarchitectural Cache-Based Side-Channel Attacks from a Digital Forensic Perspective: Methods of Exploits and Countermeasures

18. Game of Drones - Detecting Spying Drones Using Time Domain Analysis

19. Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions

20. 3D printer audio and vibration side channel dataset for vulnerability research in additive manufacturing security.

21. Identification of Abnormal Functioning of Devices of Cyber-Physical Systems

22. A Systematic Appraisal of Side Channel Evaluation Strategies

23. Automatic Detection and Repair of Transition- Based Leakage in Software Binaries

24. Validation of Abstract Side-Channel Models for Computer Architectures

25. Quantifying Information Leakage Using Model Counting Constraint Solvers

26. Evaluation of Cache Attacks on Arm Processors and Secure Caches.

27. Leaking Secrets Through Modern Branch Predictors in the Speculative World.

28. NeuralD: Detecting Indistinguishability Violations of Oblivious RAM With Neural Distinguishers.

29. A compiler and verifier for page access oblivious computation

30. Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments.

31. Sponges Resist Leakage: The Case of Authenticated Encryption

32. Efficient Information-Flow Verification Under Speculative Execution

33. Assessment of the Key-Reuse Resilience of NewHope

34. Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

35. Inferring UI States of Mobile Applications Through Power Side Channel Exploitation

36. Quantitative estimation of side-channel leaks with neural networks.

37. Gimli : A Cross-Platform Permutation

38. LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization

39. Moving Target Defense Mechanism for Side-Channel Attacks.

40. EMFORCED: EM-Based Fingerprinting Framework for Remarked and Cloned Counterfeit IC Detection Using Machine Learning Classification.

41. Counting Keys in Parallel After a Side Channel Attack

42. A Leakage Resilient MAC

43. Dynamically Provisioning Isolation in Hierarchical Architectures

44. The Temperature Side Channel and Heating Fault Attacks

45. A characterization of side channel development.

46. Digital Audio Signature for 3D Printing Integrity.

47. Android Security Permissions – Can We Trust Them?

48. Security Implications of Crosstalk in Switching CMOS Gates

49. The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning.

50. A Directive Antenna Based on Conducting Disks for Detecting Unintentional EM Emissions at Large Distances.

Catalog

Books, media, physical & digital resources