Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …
Leakage assessment methodology: A clear roadmap for side-channel evaluations
Evoked by the increasing need to integrate side-channel countermeasures into security-
enabled commercial devices, evaluation labs are seeking a standard approach that enables …
enabled commercial devices, evaluation labs are seeking a standard approach that enables …
The temperature side channel and heating fault attacks
In this paper, we present practical results of data leakages of CMOS devices via the
temperature side channel—a side channel that has been widely cited in literature but not …
temperature side channel—a side channel that has been widely cited in literature but not …
How (not) to use welch's t-test in side-channel security evaluations
FX Standaert - Smart Card Research and Advanced Applications: 17th …, 2019 - Springer
Abstract The Test Vector Leakage Assessment (TVLA) methodology is a qualitative tool
relying on Welch's T-test to assess the security of cryptographic implementations against …
relying on Welch's T-test to assess the security of cryptographic implementations against …
From improved leakage detection to the detection of points of interests in leakage traces
Leakage detection usually refers to the task of identifying data-dependent information in side-
channel measurements, independent of whether this information can be exploited. Detecting …
channel measurements, independent of whether this information can be exploited. Detecting …
Leakage assessment methodology: Extended version
Evoked by the increasing need to integrate side-channel countermeasures into security-
enabled commercial devices, evaluation labs are seeking a standard approach that enables …
enabled commercial devices, evaluation labs are seeking a standard approach that enables …
An experimental study of reduced-voltage operation in modern FPGAs for neural network acceleration
We empirically evaluate an undervolting technique, ie, underscaling the circuit supply
voltage below the nominal level, to improve the power-efficiency of Convolutional Neural …
voltage below the nominal level, to improve the power-efficiency of Convolutional Neural …
Does coupling affect the security of masked implementations?
Masking schemes achieve provable security against side-channel analysis by using secret
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …
sharing to decorrelate key-dependent intermediate values of the cryptographic algorithm …
Leaky wires: Information leakage and covert communication between FPGA long wires
Field-Programmable Gate Arrays (FPGAs) are integrated circuits that implement
reconfigurable hardware. They are used in modern systems, creating specialized, highly …
reconfigurable hardware. They are used in modern systems, creating specialized, highly …
Leakier wires: Exploiting FPGA long wires for covert-and side-channel attacks
In complex FPGA designs, implementations of algorithms and protocols from third-party
sources are common. However, the monolithic nature of FPGAs means that all sub-circuits …
sources are common. However, the monolithic nature of FPGAs means that all sub-circuits …