Articles with "channel attack" as a keyword



Photo from wikipedia

Differential audio analysis: a new side-channel attack on PIN pads

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Information Security"

DOI: 10.1007/s10207-018-0403-7

Abstract: This paper introduces a low-cost side-channel attack that identifies the pressed key of tamper-proof mechanical keypads by exploiting the sound that emanates from the pressed key. Classical sound-based attacks usually identify the pressed key using… read more here.

Keywords: attack; pin pads; side channel; channel attack ... See more keywords
Photo by vita_belvita from unsplash

Side Channel Attack-Aware Resource Allocation for URLLC and eMBB Slices in 5G RAN

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2019.2962179

Abstract: Network slicing is a key enabling technology to realize the provisioning of customized services in 5G paradigm. Due to logical isolation instead of physical isolation, network slicing is facing a series of security issues. Side… read more here.

Keywords: embb slices; channel attack; side channel; resource allocation ... See more keywords
Photo by nampoh from unsplash

A Zero-Day Cloud Timing Channel Attack

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3227420

Abstract: The Intrusion Detection and Prevention System (IDPS) services of a North American cloud service provider were ineffective against a simulated network timing channel attack. During the tests, three conspiring white hat agents exchanged a total… read more here.

Keywords: channel attack; tex math; service; inline formula ... See more keywords
Photo by vita_belvita from unsplash

ID-Based Ring Signature against Continual Side Channel Attack

Sign Up to like & get
recommendations!
Published in 2023 at "Symmetry"

DOI: 10.3390/sym15010179

Abstract: The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring signature has good application value, which can provide more flexibility… read more here.

Keywords: channel attack; signature; side channel; ring signature ... See more keywords
Photo by vita_belvita from unsplash

ThermalAttackNet: Are CNNs Making It Easy to Perform Temperature Side-Channel Attack in Mobile Edge Devices?

Sign Up to like & get
recommendations!
Published in 2021 at "Future Internet"

DOI: 10.36227/techrxiv.12685652

Abstract: Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation… read more here.

Keywords: side channel; side; channel attack; mobile edge ... See more keywords