Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Kiaei, Pantea"'
Autor:
Kiaei, Pantea, Yao, Yuan, Liu, Zhenyuan, Fern, Nicole, Breunesse, Cees-Bart, Van Woudenberg, Jasper, Gillis, Kate, Dich, Alex, Grossmann, Peter, Schaumont, Patrick
While side-channel leakage is traditionally evaluated from a fabricated chip, it is more time-efficient and cost-effective to do so during the design phase of the chip. We present a methodology to rank the gates of a design according to their contrib
Externí odkaz:
http://arxiv.org/abs/2204.11972
Publikováno v:
Proceedings of the Great Lakes Symposium on VLSI 2022 (GLSVLSI '22), June 6--8, 2022, Irvine, CA, USA
Pre-silicon side-channel leakage assessment is a useful tool to identify hardware vulnerabilities at design time, but it requires many high-resolution power traces and increases the power simulation cost of the design. By downsampling and averaging t
Externí odkaz:
http://arxiv.org/abs/2204.04160
Lightweight block ciphers have been widely used in applications such as RFID tags, IoTs, and network sensors. Among them, with comparable parameters, the Light Encryption Device (LED) block cipher achieves the smallest area. However, implementation o
Externí odkaz:
http://arxiv.org/abs/2108.12079
Publikováno v:
Boston (and Beyond) Area Architecture Workshop 2021
Power-based side-channel is a serious security threat to the System on Chip (SoC). The secret information is leaked from the power profile of the system while a cryptographic algorithm is running. The mitigation requires efforts from both the softwar
Externí odkaz:
http://arxiv.org/abs/2107.01725
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attack
Side-channel and fault injection attacks reveal secret information by monitoring or manipulating the physical effects of computations involving secret variables. Circuit-level countermeasures help to deter these attacks, and traditionally such counte
Externí odkaz:
http://arxiv.org/abs/2106.13784
Autor:
Kiaei, Pantea
The cryptographic algorithms are designed to be mathematically secure; however, side-channel analysis attacks go beyond mathematics by taking measurements of the device’s electrical activity to reveal the secret data of a cipher. These attacks also
Externí odkaz:
http://hdl.handle.net/10919/93537
Mutation analysis is an effective technique to evaluate a test suite adequacy in terms of revealing unforeseen bugs in software. Traditional source- or IR-level mutation analysis is not applicable to the software only available in binary format. This
Externí odkaz:
http://arxiv.org/abs/2102.05709
Autor:
Kiaei, Pantea, Breunesse, Cees-Bart, Ahmadi, Mohsen, Schaumont, Patrick, van Woudenberg, Jasper
Fault injection attacks can cause errors in software for malicious purposes. Oftentimes, vulnerable points of a program are detected after its development. It is therefore critical for the user of the program to be able to apply last-minute security
Externí odkaz:
http://arxiv.org/abs/2011.14067
Autor:
Kiaei, Pantea, Schaumont, Patrick
In typical embedded applications, the precise execution time of the program does not matter, and it is sufficient to meet a real-time deadline. However, modern applications in information security have become much more time-sensitive, due to the risk
Externí odkaz:
http://arxiv.org/abs/2005.02562
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.