Essays about: "Side-Channel Attack"
Showing result 21 - 25 of 26 essays containing the words Side-Channel Attack.
-
21. Minimizing Side-Channel Attack Vulnerability via Schedule Randomization
University essay from Lunds universitet/Institutionen för reglerteknikAbstract : Predictable and repeatable execution is the key to ensuring functional correctness for real-time systems. Scheduling algorithms are designed to generate schedules that repeat after a certain amount of time has passed. However, this repeatability is also a vulnerability when side-channel attacks are considered. READ MORE
-
22. Electromagnetic analysis of AES-256 on Xilinx Artix-7
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In this project, an electromagnetic side-channel attack has been made by exploiting the information leakage from a field programmable gate array (FPGA) and an implemented advanced encryption standard with a 256-bit key (AES-256). The FPGA-board was a Nexys-4 from Digilent with Artix-7 FPGA. The attack was partially successful. READ MORE
-
23. On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. READ MORE
-
24. Torminator: A Tor fingerprinting suite : Or how the Tor-network might get a surprise attack from the future. “I’ll be back” – The Terminator
University essay from KTH/KommunikationsnätAbstract : Tor is a very popular anonymisation software and network. For which we created Torminator, a fingerprinting suite written in the Java programming language. Fingerprinting is an attack type applicable to Tor utilising side-channel information from the network packets. READ MORE
-
25. Keyboard Acoustic Emanations Attack : An Empirical study
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : The sounds produced from the keystrokes when a user types on the keyboard are called keyboard acoustic emanations. These sounds can be recorded with a microphone and stored as a file on the computer. Different techniques can be used to retrieve each keystroke. READ MORE