Security and privacy protection in visual sensor networks: A survey
Visual sensor networks (VSNs) are receiving a lot of attention in research, and at the same
time, commercial applications are starting to emerge. VSN devices come with image …
time, commercial applications are starting to emerge. VSN devices come with image …
An overview of power analysis attacks against field programmable gate arrays
OX Standaert, E Peeters, G Rouvroy… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Since their introduction by Kocher in 1998, power analysis attacks have attracted significant
attention within the cryptographic community. While early works in the field mainly …
attention within the cryptographic community. While early works in the field mainly …
Successfully attacking masked AES hardware implementations
During the last years, several masking schemes for AES have been proposed to secure
hardware implementations against DPA attacks. In order to investigate the effectiveness of …
hardware implementations against DPA attacks. In order to investigate the effectiveness of …
Provably secure masking of AES
J Blömer, J Guajardo, V Krummel - International workshop on selected …, 2004 - Springer
A general method to secure cryptographic algorithms against side-channel attacks is the use
of randomization techniques and, in particular, masking. Roughly speaking, using random …
of randomization techniques and, in particular, masking. Roughly speaking, using random …
Power and electromagnetic analysis: Improved model, consequences and comparisons
E Peeters, FX Standaert, JJ Quisquater - Integration, 2007 - Elsevier
Since their publication in 1998 and 2001, respectively, Power and Electromagnetic Analysis
(SPA, DPA, EMA) have been successfully used to retrieve secret information stored in …
(SPA, DPA, EMA) have been successfully used to retrieve secret information stored in …
Amplifying side channels through performance degradation
Interference between processes executing on shared hardware can be used to mount
performance-degradation attacks. However, in most cases, such attacks offer little benefit for …
performance-degradation attacks. However, in most cases, such attacks offer little benefit for …
[图书][B] Handbook on securing cyber-physical critical infrastructure
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and
launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world …
launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world …
An on-chip signal suppression countermeasure to power analysis attacks
GB Ratanpal, RD Williams… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
There are several attacks that exploit the presence of side channels in hardware
implementations of cryptographic algorithms to extract secret data. Differential power …
implementations of cryptographic algorithms to extract secret data. Differential power …
Physical side-channel attacks and covert communication on FPGAs: A survey
SS Mirzargar, M Stojilović - 2019 29th International Conference …, 2019 - ieeexplore.ieee.org
Field-programmable gate arrays (FPGAs) are, like CPUs, susceptible to side-channel
information leakage and covert communication. The malleability of FPGAs enables users to …
information leakage and covert communication. The malleability of FPGAs enables users to …
A tutorial on physical security and side-channel attacks
F Koeune, FX Standaert - International School on Foundations of Security …, 2004 - Springer
A recent branch of cryptography focuses on the physical constraints that a real-life
cryptographic device must face, and attempts to exploit these constraints (running time …
cryptographic device must face, and attempts to exploit these constraints (running time …