Information leakage through passive timing attacks on RSA decryption system
T Hirata, Y Kaji - IEICE Transactions on Fundamentals of …, 2023 - search.ieice.org
A side channel attack is a means of security attacks that tries to restore secret information by
analyzing side-information such as electromagnetic wave, heat, electric energy and running …
analyzing side-information such as electromagnetic wave, heat, electric energy and running …
Information leakage through passive timing attacks on RSA decryption system
T Hirata, Y Kaji - … Symposium on Information Theory and Its …, 2020 - ieeexplore.ieee.org
The threat of timing attacks is especially serious when an attacker actively controls the input
to a target program. Countermeasures are studied to deter such active attacks, but the …
to a target program. Countermeasures are studied to deter such active attacks, but the …
A review of hardware timing channel detection and mitigation
G Chen, Z Zhu, B Mao, W Chen, J Jian… - Journal of Physics …, 2020 - iopscience.iop.org
Hardware timing channels are likely to leak information and easily ignored, which has
gradually become the target of attacker. However, there are few investigations systematically …
gradually become the target of attacker. However, there are few investigations systematically …
The Unified Side-Channel Attack Testing Methodology (USCA-TM) with Hardware Microbenchmark Validation
A Johnson - 2023 - search.proquest.com
A side-channel in computing terms is a by-product of the implementation and functioning of
a computer systems' component part. Whether it be electromagnetic (EM) emissions, heat …
a computer systems' component part. Whether it be electromagnetic (EM) emissions, heat …
Games for security under adaptive adversaries
T Antonopoulos, T Terauchi - 2019 IEEE 32nd Computer …, 2019 - ieeexplore.ieee.org
This work explores methods for proving and disproving security of systems under adaptive
adversaries. Adaptive adversaries are ones which make their next move based on the …
adversaries. Adaptive adversaries are ones which make their next move based on the …
Bucketing and information flow analysis for provable timing attack mitigation
T Terauchi, T Antonopoulos - Journal of Computer Security, 2020 - content.iospress.com
This paper investigates the effect of bucketing in security against timing-channel attacks.
Bucketing is a technique proposed to mitigate timing-channel attacks by restricting a …
Bucketing is a technique proposed to mitigate timing-channel attacks by restricting a …