Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Unraveling Attacks to Machine Learning-Based IoT Systems: A Survey and the Open Libraries Behind Them
C Liu, B Chen, W Shao, C Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The advent of the Internet of Things (IoT) has brought forth an era of unprecedented
connectivity, with an estimated 80 billion smart devices expected to be in operation by the …
connectivity, with an estimated 80 billion smart devices expected to be in operation by the …
[PDF][PDF] 侧信道攻击与防御技术研究进展
王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …
Implicit white-box implementations: White-boxing ARX ciphers
A Ranea, J Vandersmissen, B Preneel - Annual International Cryptology …, 2022 - Springer
Since the first white-box implementation of AES published twenty years ago, no significant
progress has been made in the design of secure implementations against an attacker with …
progress has been made in the design of secure implementations against an attacker with …
How to reveal the secrets of an obscure white-box implementation
White-box cryptography (WBC) protects key extraction from software implementations of
cryptographic primitives. Many academic works have been done achieving partial results …
cryptographic primitives. Many academic works have been done achieving partial results …
Yoroi: Updatable whitebox cryptography
Y Koike, T Isobe - IACR Transactions on Cryptographic Hardware and …, 2021 - tches.iacr.org
Whitebox cryptography aims to provide security in the whitebox setting where the adversary
has unlimited access to the implementation and its environment. In order to ensure security …
has unlimited access to the implementation and its environment. In order to ensure security …
Defeating state-of-the-art white-box countermeasures with advanced gray-box attacks
The goal of white-box cryptography is to protect secret keys embedded in a cryptographic
software deployed in an untrusted environment. In this article, we revisit state-of-the-art …
software deployed in an untrusted environment. In this article, we revisit state-of-the-art …
Higher-order DCA against standard side-channel countermeasures
At CHES 2016, Bos et al. introduced differential computational analysis (DCA) as an attack
on white-box software implementations of block ciphers. This attack builds on the same …
on white-box software implementations of block ciphers. This attack builds on the same …
A white-box masking scheme resisting computational and algebraic attacks
White-box cryptography attempts to protect cryptographic secrets in pure software
implementations. Due to their high utility, white-box cryptosystems (WBC) are deployed by …
implementations. Due to their high utility, white-box cryptosystems (WBC) are deployed by …
On the (Im) possibility of Preventing Differential Computation Analysis with Internal Encodings
L Castelnovi, A Houzelot - IACR Transactions on …, 2024 - ojs.ub.ruhr-uni-bochum.de
White-box cryptography aims at protecting implementations of cryptographic algorithms
against a very powerful attacker who controls the execution environment. The first defensive …
against a very powerful attacker who controls the execution environment. The first defensive …
Dummy shuffling against algebraic attacks in white-box implementations
At CHES 2016, Bos et al. showed that most of existing white-box implementations are easily
broken by standard side-channel attacks. A natural idea to apply the well-developed side …
broken by standard side-channel attacks. A natural idea to apply the well-developed side …