Context-aware intelligence in resource-constrained IoT nodes: Opportunities and challenges
Editor's note: This article provides an academic perspective of the problem, starting with a
survey of recent advances in intelligent sensing, computation, communication, and energy …
survey of recent advances in intelligent sensing, computation, communication, and energy …
Hardware security exploiting post-CMOS devices: fundamental device characteristics, state-of-the-art countermeasures, challenges and roadmap
Emerging nanoelectronic semiconductor devices have been quite promising in enhancing
hardware-oriented security and trust. However, implementing hardware security primitives …
hardware-oriented security and trust. However, implementing hardware security primitives …
[PDF][PDF] 侧信道攻击与防御技术研究进展
王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
Enhanced power and electromagnetic SCA resistance of encryption engines via a security-aware integrated all-digital LDO
A Singh, M Kar, VCK Chekuri… - IEEE Journal of Solid …, 2019 - ieeexplore.ieee.org
This article demonstrates enhanced power (P) and electromagnetic (EM) side-channel
analysis (SCA) attack resistance of standard (unprotected) 128-bit advanced encryption …
analysis (SCA) attack resistance of standard (unprotected) 128-bit advanced encryption …
Guarding machine learning hardware against physical side-channel attacks
Machine learning (ML) models can be trade secrets due to their development cost. Hence,
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …
they need protection against malicious forms of reverse engineering (eg, in IP piracy). With a …
Machine learning in wavelet domain for electromagnetic emission based malware analysis
This paper presents a signal processing and machine learning (ML) based methodology to
leverage Electromagnetic (EM) emissions from an embedded device to remotely detect a …
leverage Electromagnetic (EM) emissions from an embedded device to remotely detect a …
25.3 A 128b AES engine with higher resistance to power and electromagnetic side-channel attacks enabled by a security-aware integrated all-digital low-dropout …
Side channel attacks (SCA) exploit data-dependent information leakage through power
consumption and electromagnetic (EM) emissions from cryptographic engines to uncover …
consumption and electromagnetic (EM) emissions from cryptographic engines to uncover …
Dual-hiding side-channel-attack resistant FPGA-based asynchronous-logic AES: Design, countermeasures and evaluation
KS Chong, JS Ng, J Chen, NKZ Lwin… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
We present a side-channel-attack (SCA) resistant asynchronous-logic (async-logic)
Advanced Encryption Standard (AES) accelerator with dual-hiding SCA countermeasures, ie …
Advanced Encryption Standard (AES) accelerator with dual-hiding SCA countermeasures, ie …
VLSI architecture of S-box with high area efficiency based on composite field arithmetic
YT Teng, WL Chin, DK Chang, PY Chen… - IEEE Access, 2021 - ieeexplore.ieee.org
This work aims at optimizing the hardware implementation of the SubBytes and inverse
SubBytes operations in the advanced encryption standard (AES). To this, the composite field …
SubBytes operations in the advanced encryption standard (AES). To this, the composite field …
A new side-channel vulnerability on modern computers by exploiting electromagnetic emanations from the power management unit
This paper presents a new micro-architectural vulnerability on the power management units
of modern computers which creates an electromagnetic-based side-channel. The key …
of modern computers which creates an electromagnetic-based side-channel. The key …