Masking dilithium: Efficient implementation and side-channel evaluation

V Migliore, B Gérard, M Tibouchi… - Applied Cryptography and …, 2019 - Springer
Although security against side-channel attacks is not an explicit design criterion of the NIST
post-quantum standardization effort, it is certainly a major concern for schemes that are …

Power-based side-channel instruction-level disassembler

J Park, X Xu, Y Jin, D Forte, M Tehranipoor - Proceedings of the 55th …, 2018 - dl.acm.org
Modern embedded computing devices are vulnerable against malware and software piracy
due to insufficient security scrutiny and the complications of continuous patching. To detect …

Miracle: Micro-architectural leakage evaluation

B Marshall, D Page, J Webb - Cryptology ePrint Archive, 2021 - eprint.iacr.org
In this paper, we describe an extensible experimental infrastructure and methodology for
evaluating the micro-architectural leakage, based on power consumption, which stems from …

Leveraging side-channel information for disassembly and security

J Park, F Rahman, A Vassilev, D Forte… - ACM Journal on …, 2019 - dl.acm.org
With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical
devices, smart home appliances, as well as traditional computing platforms such as …

A bit-level approach to side channel based disassembling

V Cristiani, M Lecomte, T Hiscock - … 11–13, 2019, Revised Selected Papers …, 2020 - Springer
Abstract Side-Channel Based Disassembling (SCBD) is a powerful application of side-
channel analysis that allows recovering instructions executed by a processor from its …

Using Power Clues to Hack IoT Devices: The power side channel provides for instruction-level disassembly

J Park, A Tyagi - IEEE Consumer Electronics Magazine, 2017 - ieeexplore.ieee.org
The field of consumer electronics (CE) has gone digital, inheriting all the security problems
of the digital world in the process. The Internet of Things (IoT) class of CE devices is still in a …

Mitigating power side channels during compilation

J Wang, C Sung, C Wang - Proceedings of the 2019 27th ACM Joint …, 2019 - dl.acm.org
The code generation modules inside modern compilers, which use a limited number of CPU
registers to store a large number of program variables, may introduce side-channel leaks …

Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - arXiv preprint arXiv …, 2024 - arxiv.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …

Asynchronous control of orientation and displacement in a robot vehicle

JL Crowley - 1989 IEEE International Conference on Robotics and …, 1989 - computer.org
Side-channel attacks are among the most powerful and cost-effective attacks on
cryptographic systems. Simulators that are developed for side-channel analysis are very …

Power contracts: Provably complete power leakage models for processors

R Bloem, B Gigerl, M Gourjon, V Hadzic… - Proceedings of the …, 2022 - dl.acm.org
The protection of cryptographic software implementations against power-analysis attacks is
critical for applications in embedded systems. A commonly used algorithmic …