Zobrazeno 1 - 10
of 159
pro vyhledávání: '"GANJI, FATEMEH"'
Deploying machine learning-based intrusion detection systems (IDSs) on hardware devices is challenging due to their limited computational resources, power consumption, and network connectivity. Hence, there is a significant need for robust, deep lear
Externí odkaz:
http://arxiv.org/abs/2311.04194
The complexity of modern integrated circuits (ICs) necessitates collaboration between multiple distrusting parties, including thirdparty intellectual property (3PIP) vendors, design houses, CAD/EDA tool vendors, and foundries, which jeopardizes confi
Externí odkaz:
http://arxiv.org/abs/2208.03822
Recent work has highlighted the risks of intellectual property (IP) piracy of deep learning (DL) models from the side-channel leakage of DL hardware accelerators. In response, to provide side-channel leakage resiliency to DL hardware accelerators, se
Externí odkaz:
http://arxiv.org/abs/2208.03806
Autor:
Koblah, David Selasi, Acharya, Rabin Yu, Capecci, Daniel, Dizon-Paradis, Olivia P., Tajik, Shahin, Ganji, Fatemeh, Woodard, Damon L., Forte, Domenic
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation. In recent years, this use has exponentially increased due to the advancement of high-p
Externí odkaz:
http://arxiv.org/abs/2204.09579
Publikováno v:
In Energy and Climate Change December 2024 5
Side-channel attacks extracting sensitive data from implementations have been considered a major threat to the security of cryptographic schemes. This has elevated the need for improved designs by embodying countermeasures, with masking being the mos
Externí odkaz:
http://arxiv.org/abs/2106.12714
InfoNEAT: Information Theory-based NeuroEvolution of Augmenting Topologies for Side-channel Analysis
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those crypto-cores assumed to
Externí odkaz:
http://arxiv.org/abs/2105.00117
Autor:
Ganji, Fatemeh a, Kamani, Hossein b, ∗∗, Ghayebzadeh, Mehdi b, Abdipour, Hossein c, ∗, Moein, Hossein b
Publikováno v:
In Heliyon 30 January 2024 10(2)
Due to its sound theoretical basis and practical efficiency, masking has become the most prominent countermeasure to protect cryptographic implementations against physical side-channel attacks (SCAs). The core idea of masking is to randomly split eve
Externí odkaz:
http://arxiv.org/abs/2009.04263