Security and privacy protection in visual sensor networks: A survey

T Winkler, B Rinner - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Visual sensor networks (VSNs) are receiving a lot of attention in research, and at the same
time, commercial applications are starting to emerge. VSN devices come with image …

An overview of power analysis attacks against field programmable gate arrays

OX Standaert, E Peeters, G Rouvroy… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Since their introduction by Kocher in 1998, power analysis attacks have attracted significant
attention within the cryptographic community. While early works in the field mainly …

Successfully attacking masked AES hardware implementations

S Mangard, N Pramstaller, E Oswald - International workshop on …, 2005 - Springer
During the last years, several masking schemes for AES have been proposed to secure
hardware implementations against DPA attacks. In order to investigate the effectiveness of …

Provably secure masking of AES

J Blömer, J Guajardo, V Krummel - International workshop on selected …, 2004 - Springer
A general method to secure cryptographic algorithms against side-channel attacks is the use
of randomization techniques and, in particular, masking. Roughly speaking, using random …

Power and electromagnetic analysis: Improved model, consequences and comparisons

E Peeters, FX Standaert, JJ Quisquater - Integration, 2007 - Elsevier
Since their publication in 1998 and 2001, respectively, Power and Electromagnetic Analysis
(SPA, DPA, EMA) have been successfully used to retrieve secret information stored in …

Amplifying side channels through performance degradation

T Allan, BB Brumley, K Falkner, J Van de Pol… - Proceedings of the …, 2016 - dl.acm.org
Interference between processes executing on shared hardware can be used to mount
performance-degradation attacks. However, in most cases, such attacks offer little benefit for …

[图书][B] Handbook on securing cyber-physical critical infrastructure

SK Das, K Kant, N Zhang - 2012 - books.google.com
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and
launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world …

An on-chip signal suppression countermeasure to power analysis attacks

GB Ratanpal, RD Williams… - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
There are several attacks that exploit the presence of side channels in hardware
implementations of cryptographic algorithms to extract secret data. Differential power …

Physical side-channel attacks and covert communication on FPGAs: A survey

SS Mirzargar, M Stojilović - 2019 29th International Conference …, 2019 - ieeexplore.ieee.org
Field-programmable gate arrays (FPGAs) are, like CPUs, susceptible to side-channel
information leakage and covert communication. The malleability of FPGAs enables users to …

A tutorial on physical security and side-channel attacks

F Koeune, FX Standaert - International School on Foundations of Security …, 2004 - Springer
A recent branch of cryptography focuses on the physical constraints that a real-life
cryptographic device must face, and attempts to exploit these constraints (running time …