Screaming channels: When electromagnetic side channels meet radio transceivers
This paper presents a new side channel that affects mixed-signal chips used in widespread
wireless communication protocols, such as Bluetooth and WiFi. This increasingly common …
wireless communication protocols, such as Bluetooth and WiFi. This increasingly common …
Embedded electronic circuits for cryptography, hardware security and true random number generation: an overview
We provide an overview of selected crypto‐hardware devices, with a special reference to the
lightweight electronic implementation of encryption/decryption schemes, hash functions, and …
lightweight electronic implementation of encryption/decryption schemes, hash functions, and …
Experimental demonstration of electromagnetic information leakage from modern processor-memory systems
This paper shows that electromagnetic (EM) information leakage from modern laptops and
desktops (with no peripherals attached) is indeed possible and is relatively easy to achieve …
desktops (with no peripherals attached) is indeed possible and is relatively easy to achieve …
A threat for tablet pcs in public space: Remote visualization of screen images using em emanation
The use of tablet PCs is spreading rapidly, and accordingly users browsing and inputting
personal information in public spaces can often be seen by third parties. Unlike conventional …
personal information in public spaces can often be seen by third parties. Unlike conventional …
Spectral profiling: Observer-effect-free profiling by monitoring EM emanations
This paper presents Spectral Profiling, a new method for profiling program execution without
instrumenting or otherwise affecting the profiled system. Spectral Profiling monitors EM …
instrumenting or otherwise affecting the profiled system. Spectral Profiling monitors EM …
[HTML][HTML] Flexible graphene/silver nanoparticles/aluminum film paper for high-performance electromagnetic interference shielding
Rubber and plastic are widely acted as substrates in flexible electromagnetic shielding
(EMS) materials. However, these materials have several drawbacks in practical applications …
(EMS) materials. However, these materials have several drawbacks in practical applications …
Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel
We introduce screen gleaning, a TEMPEST attack in which the screen of a mobile device is
read without a visual line of sight, revealing sensitive information displayed on the phone …
read without a visual line of sight, revealing sensitive information displayed on the phone …
A method for finding frequency-modulated and amplitude-modulated electromagnetic emanations in computer systems
This paper presents an algorithm for finding carriers of frequency-modulated (FM) and
amplitude-modulated (AM) electromagnetic (EM) emanations from computer systems …
amplitude-modulated (AM) electromagnetic (EM) emanations from computer systems …
Secure Machine Learning Hardware: Challenges and Progress [Feature]
With the rising adoption of deep neural networks (DNNs) for commercial and high-stakes
applications that process sensitive user data and make critical decisions, security concerns …
applications that process sensitive user data and make critical decisions, security concerns …
Design and evaluation of countermeasures against fault injection attacks and power side-channel leakage exploration for AES block cipher
Differential Fault Analysis (DFA) and Power Analysis (PA) attacks, have become the main
methods for exploiting the vulnerabilities of physical implementations of block ciphers …
methods for exploiting the vulnerabilities of physical implementations of block ciphers …