Sökning: "Side-Channels"
Visar resultat 1 - 5 av 12 avhandlingar innehållade ordet Side-Channels.
1. Software Diversification for WebAssembly
Sammanfattning : WebAssembly, now the fourth ocially recognized web language, enables web browsers to port native applications to the Web. Furthermore, WebAssembly has evolved into an essential element for backend scenarios such as cloud and edge computing. LÄS MER
2. On Certificate Transparency Verification and Unlinkability of Websites Visited by Tor Users
Sammanfattning : Certificate Transparency is an ecosystem of logs, monitors, and auditors that hold certificate authorities accountable while issuing certificates. We show how the amount of trust that TLS clients and domain owners need to place in Certificate Transparency can be reduced, both in the context of existing gradual deployments and the largely unexplored area of Tor. LÄS MER
3. Ice, wood and rocks : regulating elements in riverine ecosystems
Sammanfattning : Riparian ecosystems are of great importance in the landscape, connecting landscape elements longitudinally and laterally and often encompassing sharp environmental gradients in ecological processes and communities. They are influenced by fluvial disturbances such as flooding, erosion and sediment deposition, which create dynamic and spatially heterogeneous habitats that support a high diversity of species. LÄS MER
4. Surface tension-driven flow in soft porous materials — An investigation of the mechanism of capillary flow in microchannels of hydrogels
Sammanfattning : Spontaneous spreading of liquids in porous materials is of great industrial relevance and occurs in, for example, diapers, fabrics, paper or paint. Often, it is necessary to manipulate the spreading rate of liquids to result in the desired mass transport, for example to soak up large liquid volumes, as in a diaper. LÄS MER
5. Deep Learning Side-Channel Attacks on Advanced Encryption Standard
Sammanfattning : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. LÄS MER