Artigos de revistas sobre o tema "Side channels attacks"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Side channels attacks".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Mostovoy, R. A., A. B. Levina, D. M. Sleptsova e P. S. Borisenko. "SIDE-CHANNEL ATTACKS ON THE MOBILE PHONES". Vestnik komp'iuternykh i informatsionnykh tekhnologii, n.º 186 (dezembro de 2019): 46–53. http://dx.doi.org/10.14489/vkit.2019.12.pp.046-053.
Texto completo da fonteBrotzman, Robert, Danfeng Zhang, Mahmut Taylan Kandemir e Gang Tan. "SpecSafe: detecting cache side channels in a speculative world". Proceedings of the ACM on Programming Languages 5, OOPSLA (20 de outubro de 2021): 1–28. http://dx.doi.org/10.1145/3485506.
Texto completo da fonteBoroda, Anatoly, e Taras Petrenko. "IMPACT OF ATTACKS THROUGH SIDE CHANNELS ON INFORMATION SECURITY". TECHNICAL SCIENCES AND TECHNOLOGIES, n.º 4(34) (2023): 91–103. http://dx.doi.org/10.25140/2411-5363-2023-4(34)-91-103.
Texto completo da fonteLou, Xiaoxuan, Tianwei Zhang, Jun Jiang e Yinqian Zhang. "A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography". ACM Computing Surveys 54, n.º 6 (julho de 2021): 1–37. http://dx.doi.org/10.1145/3456629.
Texto completo da fonteSu, Chao, e Qingkai Zeng. "Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures". Security and Communication Networks 2021 (10 de junho de 2021): 1–15. http://dx.doi.org/10.1155/2021/5559552.
Texto completo da fonteAttah, Amankwah. "Mitigating Electromagnetic Side-Channel Attacks". Advances in Multidisciplinary and scientific Research Journal Publication 1, n.º 1 (20 de julho de 2022): 71–76. http://dx.doi.org/10.22624/aims/crp-bk3-p12.
Texto completo da fonteDerevianko, Ya A., e I. D. Gorbenko. "FALCON signature vulnerability to special attacks and its protection". Radiotekhnika, n.º 210 (28 de setembro de 2022): 37–52. http://dx.doi.org/10.30837/rt.2022.3.210.03.
Texto completo da fonteAlexander, Geoffrey, Antonio M. Espinoza e Jedidiah R. Crandall. "Detecting TCP/IP Connections via IPID Hash Collisions". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de outubro de 2019): 311–28. http://dx.doi.org/10.2478/popets-2019-0071.
Texto completo da fonteBache, Florian, Christina Plump, Jonas Wloka, Tim Güneysu e Rolf Drechsler. "Evaluation of (power) side-channels in cryptographic implementations". it - Information Technology 61, n.º 1 (25 de fevereiro de 2019): 15–28. http://dx.doi.org/10.1515/itit-2018-0028.
Texto completo da fonteZhang, Xiaojuan, Yayun Zhu, Baiji Hu, Jingyi Cao e Ziqing Lin. "A Novel Power System Side Channel Attack Method Based on Machine Learning CNN-Transformer". Journal of Physics: Conference Series 2615, n.º 1 (1 de outubro de 2023): 012011. http://dx.doi.org/10.1088/1742-6596/2615/1/012011.
Texto completo da fonteAydin, Furkan, Aydin Aysu, Mohit Tiwari, Andreas Gerstlauer e Michael Orshansky. "Horizontal Side-Channel Vulnerabilities of Post-Quantum Key Exchange and Encapsulation Protocols". ACM Transactions on Embedded Computing Systems 20, n.º 6 (30 de novembro de 2021): 1–22. http://dx.doi.org/10.1145/3476799.
Texto completo da fonteGnanavel, S., K. E. Narayana, K. Jayashree, P. Nancy e Dawit Mamiru Teressa. "Implementation of Block-Level Double Encryption Based on Machine Learning Techniques for Attack Detection and Prevention". Wireless Communications and Mobile Computing 2022 (9 de julho de 2022): 1–9. http://dx.doi.org/10.1155/2022/4255220.
Texto completo da fonteWu, Dehua, Wan’ang Xiao, Shan Gao e Wanlin Gao. "A novel cache based on dynamic mapping against speculative execution attacks". MATEC Web of Conferences 355 (2022): 03054. http://dx.doi.org/10.1051/matecconf/202235503054.
Texto completo da fonteAlbalawi, Abdullah. "On Preventing and Mitigating Cache Based Side-Channel Attacks on AES System in Virtualized Environments". Computer and Information Science 17, n.º 1 (27 de fevereiro de 2024): 9. http://dx.doi.org/10.5539/cis.v17n1p9.
Texto completo da fonteMa, Cong, Dinghao Wu, Gang Tan, Mahmut Taylan Kandemir e Danfeng Zhang. "Quantifying and Mitigating Cache Side Channel Leakage with Differential Set". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16 de outubro de 2023): 1470–98. http://dx.doi.org/10.1145/3622850.
Texto completo da fonteHe, Jiaji, Xiaolong Guo, Mark Tehranipoor, Apostol Vassilev e Yier Jin. "EM Side Channels in Hardware Security: Attacks and Defenses". IEEE Design & Test 39, n.º 2 (abril de 2022): 100–111. http://dx.doi.org/10.1109/mdat.2021.3135324.
Texto completo da fonteJayasinghe, Darshana, Aleksandar Ignjatovic, Roshan Ragel, Jude Angelo Ambrose e Sri Parameswaran. "QuadSeal: Quadruple Balancing to Mitigate Power Analysis Attacks with Variability Effects and Electromagnetic Fault Injection Attacks". ACM Transactions on Design Automation of Electronic Systems 26, n.º 5 (5 de junho de 2021): 1–36. http://dx.doi.org/10.1145/3443706.
Texto completo da fonteSoares, Rafael I., Ney L. V. Calazans, Victor Lomné, Amine Dehbaoui, Philippe Maurine e Lionel Torres. "A GALS Pipeline DES Architecture to Increase Robustness against CPA and CEMA Attacks". Journal of Integrated Circuits and Systems 6, n.º 1 (27 de dezembro de 2011): 25–34. http://dx.doi.org/10.29292/jics.v6i1.335.
Texto completo da fonteSzefer, Jakub. "Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses". Journal of Hardware and Systems Security 3, n.º 3 (13 de setembro de 2018): 219–34. http://dx.doi.org/10.1007/s41635-018-0046-1.
Texto completo da fonteGruss, Daniel. "Software-based microarchitectural attacks". it - Information Technology 60, n.º 5-6 (19 de dezembro de 2018): 335–41. http://dx.doi.org/10.1515/itit-2018-0034.
Texto completo da fonteTerauchi, Tachio, e Timos Antonopoulos. "Bucketing and information flow analysis for provable timing attack mitigation". Journal of Computer Security 28, n.º 6 (27 de novembro de 2020): 607–34. http://dx.doi.org/10.3233/jcs-191356.
Texto completo da fonteTian, Jing, Gang Xiong, Zhen Li e Gaopeng Gou. "A Survey of Key Technologies for Constructing Network Covert Channel". Security and Communication Networks 2020 (5 de agosto de 2020): 1–20. http://dx.doi.org/10.1155/2020/8892896.
Texto completo da fonteSantoso, Bagus, e Yasutada Oohama. "Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks †". Entropy 21, n.º 8 (9 de agosto de 2019): 781. http://dx.doi.org/10.3390/e21080781.
Texto completo da fonteSalomon, Dor, Amir Weiss e Itamar Levi. "Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis". Cryptography 5, n.º 3 (13 de setembro de 2021): 24. http://dx.doi.org/10.3390/cryptography5030024.
Texto completo da fonteAl-Eidi, Shorouq, Omar Darwish e Yuanzhu Chen. "Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications". Sensors 20, n.º 8 (24 de abril de 2020): 2417. http://dx.doi.org/10.3390/s20082417.
Texto completo da fonteJia, Hefei, Xu Liu, Xiaoqiang Di, Hui Qi, Binbin Cai, Jinqing Li, Huamin Yang e Jianping Zhao. "A Secure Virtual Machine Allocation Strategy Against Co-Resident Attacks". Journal of Advanced Computational Intelligence and Intelligent Informatics 23, n.º 5 (20 de setembro de 2019): 898–908. http://dx.doi.org/10.20965/jaciii.2019.p0898.
Texto completo da fonteMolotkov, S. N. "Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography". Journal of Experimental and Theoretical Physics 130, n.º 6 (junho de 2020): 809–32. http://dx.doi.org/10.1134/s1063776120050064.
Texto completo da fonteZoughbi, Dina Mohsen, e Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment". International Journal of Innovative Technology and Exploring Engineering 10, n.º 2 (10 de dezembro de 2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.
Texto completo da fonteMolotkov, S. N., e A. A. Shcherbachenko. "On the Robustness of Reference-Frame-Independent Quantum Key Distribution Systems Against Active Probing Attacks". JETP Letters 119, n.º 5 (março de 2024): 402–12. http://dx.doi.org/10.1134/s0021364024600216.
Texto completo da fonteBabukhin, D., e D. Sych. "Explicit attacks on passive side channels of the light source in the BB84 decoy state protocol". Journal of Physics: Conference Series 1984, n.º 1 (1 de julho de 2021): 012008. http://dx.doi.org/10.1088/1742-6596/1984/1/012008.
Texto completo da fonteCabodi, Gianpiero, Paolo Camurati, Fabrizio Finocchiaro e Danilo Vendraminetto. "Model-Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification". Electronics 8, n.º 9 (19 de setembro de 2019): 1057. http://dx.doi.org/10.3390/electronics8091057.
Texto completo da fonteMishra, Nimish, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair e Debdeep Mukhopadhyay. "CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 1 (4 de dezembro de 2023): 501–26. http://dx.doi.org/10.46586/tches.v2024.i1.501-526.
Texto completo da fonteRepka, Marek, e Pavol Zajac. "Overview of the Mceliece Cryptosystem and its Security". Tatra Mountains Mathematical Publications 60, n.º 1 (1 de setembro de 2014): 57–83. http://dx.doi.org/10.2478/tmmp-2014-0025.
Texto completo da fonteYesina, Maryna, e Ivan Gorbenko. "Substantiation of requirements and ways of their realization at synthesis of proof-stable perspective electronic signatures". Physico-mathematical modelling and informational technologies, n.º 32 (8 de julho de 2021): 116–20. http://dx.doi.org/10.15407/fmmit2021.32.116.
Texto completo da fonteTatarnikova, Tatiyana. "Restricting data leakage through non-obvious features of Android 5 smartphone". Information and Control Systems, n.º 5 (16 de outubro de 2019): 24–29. http://dx.doi.org/10.31799/1684-8853-2019-5-24-29.
Texto completo da fonteFischer, Andreas, Benny Fuhry, Florian Kerschbaum e Eric Bodden. "Computation on Encrypted Data using Dataflow Authentication". Proceedings on Privacy Enhancing Technologies 2020, n.º 1 (1 de janeiro de 2020): 5–25. http://dx.doi.org/10.2478/popets-2020-0002.
Texto completo da fonteGnad, Dennis R. E., Cong Dang Khoa Nguyen, Syed Hashim Gillani e Mehdi B. Tahoori. "Voltage-Based Covert Channels Using FPGAs". ACM Transactions on Design Automation of Electronic Systems 26, n.º 6 (28 de junho de 2021): 1–25. http://dx.doi.org/10.1145/3460229.
Texto completo da fonteFischer, Andreas, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum e Eric Bodden. "Computation on Encrypted Data Using Dataflow Authentication". ACM Transactions on Privacy and Security 25, n.º 3 (31 de agosto de 2022): 1–36. http://dx.doi.org/10.1145/3513005.
Texto completo da fonteMaji, Saurav, Utsav Banerjee e Anantha P. Chandrakasan. "Leaky Nets: Recovering Embedded Neural Network Models and Inputs Through Simple Power and Timing Side-Channels—Attacks and Defenses". IEEE Internet of Things Journal 8, n.º 15 (1 de agosto de 2021): 12079–92. http://dx.doi.org/10.1109/jiot.2021.3061314.
Texto completo da fonteWang, Xingyu, Wei Liu, Tianyi Wu, Chang Guo, Yijun Zhang, Shanghong Zhao e Chen Dong. "Free Space Measurement Device Independent Quantum Key Distribution with Modulating Retro-Reflectors under Correlated Turbulent Channel". Entropy 23, n.º 10 (1 de outubro de 2021): 1299. http://dx.doi.org/10.3390/e23101299.
Texto completo da fonteAinapure, Bharati, Deven Shah e A. Ananda Rao. "Adaptive multilevel fuzzy-based authentication framework to mitigate Cache side channel attack in cloud computing". International Journal of Modeling, Simulation, and Scientific Computing 09, n.º 05 (outubro de 2018): 1850045. http://dx.doi.org/10.1142/s1793962318500459.
Texto completo da fonteErata, Ferhat, Chuanqi Xu, Ruzica Piskac e Jakub Szefer. "Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 2 (12 de março de 2024): 735–68. http://dx.doi.org/10.46586/tches.v2024.i2.735-768.
Texto completo da fonteFranzoni, Federico, Xavier Salleras e Vanesa Daza. "AToM: Active topology monitoring for the bitcoin peer-to-peer network". Peer-to-Peer Networking and Applications 15, n.º 1 (14 de outubro de 2021): 408–25. http://dx.doi.org/10.1007/s12083-021-01201-7.
Texto completo da fonteSauvage, Laurent, Sylvain Guilley, Florent Flament, Jean-Luc Danger e Yves Mathieu. "Blind Cartography for Side Channel Attacks: Cross-Correlation Cartography". International Journal of Reconfigurable Computing 2012 (2012): 1–9. http://dx.doi.org/10.1155/2012/360242.
Texto completo da fonteHaehyun Cho. "A Systematic Study on Spectre Attacks and Defenses". Research Briefs on Information and Communication Technology Evolution 7 (30 de novembro de 2021): 197–203. http://dx.doi.org/10.56801/rebicte.v7i.129.
Texto completo da fonteAbduljabbar, Zaid Ameen, Vincent Omollo Nyangaresi, Hend Muslim Jasim, Junchao Ma, Mohammed Abdulridha Hussain, Zaid Alaa Hussien e Abdulla J. Y. Aldarwish. "Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture". Sustainability 15, n.º 13 (28 de junho de 2023): 10264. http://dx.doi.org/10.3390/su151310264.
Texto completo da fonteShepherd, Michael, Scott Brookes e Robert Denz. "Transient Execution and Side Channel Analysis: a Vulnerability or a Science Experiment?" International Conference on Cyber Warfare and Security 17, n.º 1 (2 de março de 2022): 288–97. http://dx.doi.org/10.34190/iccws.17.1.20.
Texto completo da fonteZhang, Qi, An Wang, Yongchuan Niu, Ning Shang, Rixin Xu, Guoshuang Zhang e Liehuang Zhu. "Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9". Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9701756.
Texto completo da fonteTran, Ngoc Quy, e Hong Quang Nguyen. "EFFICIENT CNN-BASED PROFILED SIDE CHANNEL ATTACKS". Journal of Computer Science and Cybernetics 37, n.º 1 (29 de março de 2021): 1–22. http://dx.doi.org/10.15625/1813-9663/37/1/15418.
Texto completo da fonteZhou, Ziqiao, e Michael K. Reiter. "Interpretable noninterference measurement and its application to processor designs". Proceedings of the ACM on Programming Languages 5, OOPSLA (20 de outubro de 2021): 1–30. http://dx.doi.org/10.1145/3485518.
Texto completo da fonte