Sign Up to like & get
recommendations!
1
Published in 2018 at "International Journal of Information Security"
DOI: 10.1007/s10207-018-0403-7
Abstract: This paper introduces a low-cost side-channel attack that identifies the pressed key of tamper-proof mechanical keypads by exploiting the sound that emanates from the pressed key. Classical sound-based attacks usually identify the pressed key using…
read more here.
Keywords:
attack;
pin pads;
side channel;
channel attack ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2019.2962179
Abstract: Network slicing is a key enabling technology to realize the provisioning of customized services in 5G paradigm. Due to logical isolation instead of physical isolation, network slicing is facing a series of security issues. Side…
read more here.
Keywords:
embb slices;
channel attack;
side channel;
resource allocation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3227420
Abstract: The Intrusion Detection and Prevention System (IDPS) services of a North American cloud service provider were ineffective against a simulated network timing channel attack. During the tests, three conspiring white hat agents exchanged a total…
read more here.
Keywords:
channel attack;
tex math;
service;
inline formula ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "Symmetry"
DOI: 10.3390/sym15010179
Abstract: The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring signature has good application value, which can provide more flexibility…
read more here.
Keywords:
channel attack;
signature;
side channel;
ring signature ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "Future Internet"
DOI: 10.36227/techrxiv.12685652
Abstract: Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation…
read more here.
Keywords:
side channel;
side;
channel attack;
mobile edge ... See more keywords