Sökning: "side-channel"

Visar resultat 1 - 5 av 17 avhandlingar innehållade ordet side-channel.

  1. 1. Side-Channel Analysis of Post-Quantum Cryptographic Algorithms

    Författare :Kalle Ngo; Johnny Öberg; Ingo Sander; Elena Dubrova; Lejla Batina; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Side-channel attack; Post-quantum cryptography; Deep learning; LWE LWR-based KEM; Hardware security; Sidokanalsattack; Postkvantkryptering; Djupinlärning; LWE LWR-baserad KEM; Hårdvarusäkerhet; Informations- och kommunikationsteknik; Information and Communication Technology;

    Sammanfattning : Public key cryptographic schemes used today rely on the intractability of certain mathematical problems that are known to be efficiently solvable with a large-scale quantum computer. To address the need for long-term security, in 2016 NIST started a project for standardizing post-quantum cryptography (PQC) primitives that rely on problems not known to be targets for a quantum computer, such as lattice problems. LÄS MER

  2. 2. Deep Learning Side-Channel Attacks on Advanced Encryption Standard

    Författare :Huanyu Wang; Elena Dubrova; Mark Smith; Francesco Regazzoni; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Side-channel attack; Deep learning; Advanced Encryption Standard; Hardware security; Informations- och kommunikationsteknik; Information and Communication Technology;

    Sammanfattning : Side-channel attacks (SCAs) have become one of the most realistic threats to implementations of cryptographic algorithms. By exploiting the nonprime, unintentional physical leakage, such as different amount of power consumed by the device during the execution of the cryptographic algorithm, SCAs are able to bypass the theoretical strength of cryptography and extract the secret key. LÄS MER

  3. 3. Securing the Memory Hierarchy from Speculative Side-Channel Attack

    Författare :Christos Sakalis; Magnus Själander; Sven Karlsson; Uppsala universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; Computer Science; Datavetenskap;

    Sammanfattning : Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high performance while also remaining energy efficient. However, with the introduction of Meltdown and Spectre in the beginning of 2018, speculative execution has been under attack. LÄS MER

  4. 4. Rethinking Speculative Execution from a Security Perspective

    Författare :Christos Sakalis; Magnus Själander; Alexandra Jimborean; Stefanos Kaxiras; Josep Torrellas; Uppsala universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; computer architecture; speculative execution; processor; security; out-of-order execution; side-channel; microarchitectural replay; microarchitecture; Delay-on-Miss; Ghosts; Delay-on-Squash; Computer Science; Datavetenskap;

    Sammanfattning : Speculative out-of-order execution is one of the fundamental building blocks of modern, high-performance processors. To maximize the utilization of the system's resources, hardware and software security checks in the speculative domain can be temporarily ignored, without affecting the correctness of the application, as long as no architectural changes are made before transitioning to the non-speculative domain. LÄS MER

  5. 5. Generating Optimized and Secure Binary Code

    Författare :Rodothea Myrsini Tsoupidi; Elena Troubitsyna; Panagiotis Papadimitratos; Fernando Magno Quintão Pereira; KTH; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; constraint programming; code optimization; secure compilation; side-channel attacks; code-reuse attacks; software security; villkorsprogrammering; kodoptimering; säker kompilering; sidokanalsattacker; kodåteranvändningsattacker; mjukvarusäkerhet; Informations- och kommunikationsteknik; Information and Communication Technology; Informations- och kommunikationsteknik; Information and Communication Technology;

    Sammanfattning : The increased digitalization of modern societies has resulted in a proliferation of a broad spectrum of embedded devices, ranging from personal smartphones and heart pacemakers to large-scale industrial IoT systems. Since they often handle various sensitive data, these devices increasingly become the targets of cyberattacks that threaten the integrity of personal data, financial security, and sometimes even people’s safety. LÄS MER