Fundamental challenges toward making the iot a reachable reality: A model-centric investigation

Y Xue, J Li, S Nazarian, P Bogdan - ACM Transactions on Design …, 2017 - dl.acm.org
Constantly advancing integration capability is paving the way for the construction of the
extremely large scale continuum of the Internet where entities or things from vastly varied …

Microcontrollers as (in) security devices for pervasive computing applications

D Strobel, D Oswald, B Richter… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Often overlooked, microcontrollers are the central component in embedded systems which
drive the evolution toward the Internet of Things (IoT). They are small, easy to handle, low …

Power analysis attacks against IEEE 802.15. 4 nodes

C O'Flynn, Z Chen - Constructive Side-Channel Analysis and Secure …, 2016 - Springer
Abstract IEEE 802.15. 4 is a wireless standard used by a variety of higher-level protocols,
including many used in the Internet of Things (IoT). A number of system on a chip (SoC) …

Scrutinizing {WPA2} Password Generating Algorithms in Wireless Routers

EN Lorente, C Meijer, R Verdult - 9th USENIX Workshop on Offensive …, 2015 - usenix.org
A wireless router is a networking device that enables a user to set up a wireless connection
to the Internet. A router can offer a secure channel by cryptographic means which provides …

Reverse engineering the micro-architectural leakage features of a commercial processor

S Gao, E Oswald, D Page - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Micro-architectural leakage is a reality even on low-to midrange commercial processors.
Dealing with it is expensive, because micro-architectural leakage is often only discovered …

[หนังสือ][B] The (in) security of proprietary cryptography

R Verdult - 2015 - repository.ubn.ru.nl
Proprietary cryptography is a term used to describe custom encryption techniques that are
kept secret by its designers to add additional security. It is questionable if such an approach …

Towards micro-architectural leakage simulators: reverse engineering micro-architectural leakage features is practical

S Gao, E Oswald, D Page - Annual International Conference on the Theory …, 2022 - Springer
Leakage simulators offer the tantalising promise of easy and quick testing of software with
respect to the presence of side channel leakage. The quality of their build in leakage models …

Quiescent photonics side channel analysis: Low cost SRAM readout attack

M Faraj, C Gebotys - Cryptography and Communications, 2021 - Springer
Optical emissions from semiconductors have been found to leak important information from
embedded security devices. Unfortunately, the required substrate thinning and photon …

A Comparison of-Test and Mutual Information as Distinguisher for Side-Channel Analysis

B Richter, D Knichel, A Moradi - … Conference on Smart Card Research and …, 2019 - Springer
Masking is known as the most widely studied countermeasure against side-channel analysis
attacks. Since a masked implementation is based on a certain number of shares (referred to …

Robust profiled attacks: should the adversary trust the dataset?

L Lerman, Z Martinasek… - IET Information Security, 2017 - Wiley Online Library
Side‐channel attacks provide tools to analyse the degree of resilience of a cryptographic
device against adversaries measuring leakages (eg power traces) on the target device …