Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Side Channel Attacks). Showing records 1 – 30 of 96 total matches.

[1] [2] [3] [4]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters

1. Irazoki, Gorka. Cross-core Microarchitectural Attacks and Countermeasures.

Degree: PhD, 2017, Worcester Polytechnic Institute

 In the last decade, multi-threaded systems and resource sharing have brought a number of technologies that facilitate our daily tasks in a way we never… (more)

Subjects/Keywords: Microarchitectural attacks; cache attacks; side channel attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Irazoki, G. (2017). Cross-core Microarchitectural Attacks and Countermeasures. (Doctoral Dissertation). Worcester Polytechnic Institute. Retrieved from etd-042417-114714 ; https://digitalcommons.wpi.edu/etd-dissertations/160

Chicago Manual of Style (16th Edition):

Irazoki, Gorka. “Cross-core Microarchitectural Attacks and Countermeasures.” 2017. Doctoral Dissertation, Worcester Polytechnic Institute. Accessed December 02, 2020. etd-042417-114714 ; https://digitalcommons.wpi.edu/etd-dissertations/160.

MLA Handbook (7th Edition):

Irazoki, Gorka. “Cross-core Microarchitectural Attacks and Countermeasures.” 2017. Web. 02 Dec 2020.

Vancouver:

Irazoki G. Cross-core Microarchitectural Attacks and Countermeasures. [Internet] [Doctoral dissertation]. Worcester Polytechnic Institute; 2017. [cited 2020 Dec 02]. Available from: etd-042417-114714 ; https://digitalcommons.wpi.edu/etd-dissertations/160.

Council of Science Editors:

Irazoki G. Cross-core Microarchitectural Attacks and Countermeasures. [Doctoral Dissertation]. Worcester Polytechnic Institute; 2017. Available from: etd-042417-114714 ; https://digitalcommons.wpi.edu/etd-dissertations/160


Delft University of Technology

2. van Tienen, Freek (author). Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications.

Degree: 2018, Delft University of Technology

 In almost every device cryptographic functions are used to protect data and sensitive information from being intercepted. A commonly used encryption algorithm is the Advanced… (more)

Subjects/Keywords: Side-Channel Attacks; AES; Electromagnetic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

van Tienen, F. (. (2018). Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b

Chicago Manual of Style (16th Edition):

van Tienen, Freek (author). “Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications.” 2018. Masters Thesis, Delft University of Technology. Accessed December 02, 2020. http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b.

MLA Handbook (7th Edition):

van Tienen, Freek (author). “Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications.” 2018. Web. 02 Dec 2020.

Vancouver:

van Tienen F(. Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2020 Dec 02]. Available from: http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b.

Council of Science Editors:

van Tienen F(. Far-field Correlation Electromagnetic Analysis attacks against AES in real world applications. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:50d1a4f2-2458-47f5-a176-3439cefcc20b


Georgia Tech

3. Shih, Mingwei. Securing Intel SGX against side-channel attacks via load-time synthesis.

Degree: PhD, Computer Science, 2019, Georgia Tech

 In response to the growing need for securing user data in the cloud, recent Intel processors have supported a new feature, Intel Software Guard Extensions… (more)

Subjects/Keywords: Intel SGX; Side-channel attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shih, M. (2019). Securing Intel SGX against side-channel attacks via load-time synthesis. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62337

Chicago Manual of Style (16th Edition):

Shih, Mingwei. “Securing Intel SGX against side-channel attacks via load-time synthesis.” 2019. Doctoral Dissertation, Georgia Tech. Accessed December 02, 2020. http://hdl.handle.net/1853/62337.

MLA Handbook (7th Edition):

Shih, Mingwei. “Securing Intel SGX against side-channel attacks via load-time synthesis.” 2019. Web. 02 Dec 2020.

Vancouver:

Shih M. Securing Intel SGX against side-channel attacks via load-time synthesis. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2020 Dec 02]. Available from: http://hdl.handle.net/1853/62337.

Council of Science Editors:

Shih M. Securing Intel SGX against side-channel attacks via load-time synthesis. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62337


University of New South Wales

4. Arora, Ankita. Framework and countermeasures for cache and power based attacks.

Degree: Computer Science & Engineering, 2013, University of New South Wales

 Advancements in technology, the need for automation and ease of manufacturability, have made embedded systems ubiquitous. One of the preeminent challenges in embedded systems is… (more)

Subjects/Keywords: Side Channel Attacks; Cache Attacks; Countermeasure; Power Attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Arora, A. (2013). Framework and countermeasures for cache and power based attacks. (Masters Thesis). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/52952 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11630/SOURCE01?view=true

Chicago Manual of Style (16th Edition):

Arora, Ankita. “Framework and countermeasures for cache and power based attacks.” 2013. Masters Thesis, University of New South Wales. Accessed December 02, 2020. http://handle.unsw.edu.au/1959.4/52952 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11630/SOURCE01?view=true.

MLA Handbook (7th Edition):

Arora, Ankita. “Framework and countermeasures for cache and power based attacks.” 2013. Web. 02 Dec 2020.

Vancouver:

Arora A. Framework and countermeasures for cache and power based attacks. [Internet] [Masters thesis]. University of New South Wales; 2013. [cited 2020 Dec 02]. Available from: http://handle.unsw.edu.au/1959.4/52952 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11630/SOURCE01?view=true.

Council of Science Editors:

Arora A. Framework and countermeasures for cache and power based attacks. [Masters Thesis]. University of New South Wales; 2013. Available from: http://handle.unsw.edu.au/1959.4/52952 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:11630/SOURCE01?view=true


University of New South Wales

5. Jayasinghe, Jayasinghe A. D. Nayanajith. Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks.

Degree: Faculty of Engineering, 2017, University of New South Wales

 Cryptography algorithms, such as Advanced Encryption Standard (AES) algorithm, are responsible for keeping confidential and critical data secure using a secret key to access that… (more)

Subjects/Keywords: Differential Power analysis attacks; Side channel attacks; Power analysis attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jayasinghe, J. A. D. N. (2017). Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/58605 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46363/SOURCE02?view=true

Chicago Manual of Style (16th Edition):

Jayasinghe, Jayasinghe A D Nayanajith. “Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks.” 2017. Doctoral Dissertation, University of New South Wales. Accessed December 02, 2020. http://handle.unsw.edu.au/1959.4/58605 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46363/SOURCE02?view=true.

MLA Handbook (7th Edition):

Jayasinghe, Jayasinghe A D Nayanajith. “Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks.” 2017. Web. 02 Dec 2020.

Vancouver:

Jayasinghe JADN. Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks. [Internet] [Doctoral dissertation]. University of New South Wales; 2017. [cited 2020 Dec 02]. Available from: http://handle.unsw.edu.au/1959.4/58605 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46363/SOURCE02?view=true.

Council of Science Editors:

Jayasinghe JADN. Algorithmically Balanced Circuit to Mitigate Power and Fault Injection Based Side Channel Analysis Attacks. [Doctoral Dissertation]. University of New South Wales; 2017. Available from: http://handle.unsw.edu.au/1959.4/58605 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:46363/SOURCE02?view=true


University of Texas – Austin

6. -8281-6884. Simulation-based verification of EM side-channel attack resilience of embedded cryptographic systems.

Degree: MSin Engineering, Electrical and Computer Engineering, 2017, University of Texas – Austin

 Electromagnetic (EM) fields emanated due to switching currents in crypto-blocks can be an effective non-invasive channel for extracting secret keys. Accurate design-time simulation tools are… (more)

Subjects/Keywords: Side channel attacks; Electromagnetic attacks; Differential attacks; Design for security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-8281-6884. (2017). Simulation-based verification of EM side-channel attack resilience of embedded cryptographic systems. (Masters Thesis). University of Texas – Austin. Retrieved from http://dx.doi.org/10.26153/tsw/2820

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-8281-6884. “Simulation-based verification of EM side-channel attack resilience of embedded cryptographic systems.” 2017. Masters Thesis, University of Texas – Austin. Accessed December 02, 2020. http://dx.doi.org/10.26153/tsw/2820.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-8281-6884. “Simulation-based verification of EM side-channel attack resilience of embedded cryptographic systems.” 2017. Web. 02 Dec 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-8281-6884. Simulation-based verification of EM side-channel attack resilience of embedded cryptographic systems. [Internet] [Masters thesis]. University of Texas – Austin; 2017. [cited 2020 Dec 02]. Available from: http://dx.doi.org/10.26153/tsw/2820.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-8281-6884. Simulation-based verification of EM side-channel attack resilience of embedded cryptographic systems. [Masters Thesis]. University of Texas – Austin; 2017. Available from: http://dx.doi.org/10.26153/tsw/2820

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Delft University of Technology

7. Venkatachalam, Pradeep (author). S-Net, A Neural Network Based Countermeasure for AES.

Degree: 2019, Delft University of Technology

 Hardware implementations of encryption schemes are unprotected against side-channel analysis techniques. Physical realizations of secure algorithms leak side-channel information through power, noise, time, sound and… (more)

Subjects/Keywords: Side-Channel Attacks; Hardware Security; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Venkatachalam, P. (. (2019). S-Net, A Neural Network Based Countermeasure for AES. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795

Chicago Manual of Style (16th Edition):

Venkatachalam, Pradeep (author). “S-Net, A Neural Network Based Countermeasure for AES.” 2019. Masters Thesis, Delft University of Technology. Accessed December 02, 2020. http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795.

MLA Handbook (7th Edition):

Venkatachalam, Pradeep (author). “S-Net, A Neural Network Based Countermeasure for AES.” 2019. Web. 02 Dec 2020.

Vancouver:

Venkatachalam P(. S-Net, A Neural Network Based Countermeasure for AES. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Dec 02]. Available from: http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795.

Council of Science Editors:

Venkatachalam P(. S-Net, A Neural Network Based Countermeasure for AES. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:59001df2-9b47-47c2-bfbe-d1c016902795


Virginia Tech

8. Patrick, Conor Persson. Software Protection Against Fault and Side Channel Attacks.

Degree: MS, Computer Engineering, 2017, Virginia Tech

 Embedded systems are increasingly ubiquitous. Many of them have security requirements such as smart cards, mobile phones, and internet connected appliances. It can be a… (more)

Subjects/Keywords: Fault attacks; side channel analysis; countermeasure

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Patrick, C. P. (2017). Software Protection Against Fault and Side Channel Attacks. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/78685

Chicago Manual of Style (16th Edition):

Patrick, Conor Persson. “Software Protection Against Fault and Side Channel Attacks.” 2017. Masters Thesis, Virginia Tech. Accessed December 02, 2020. http://hdl.handle.net/10919/78685.

MLA Handbook (7th Edition):

Patrick, Conor Persson. “Software Protection Against Fault and Side Channel Attacks.” 2017. Web. 02 Dec 2020.

Vancouver:

Patrick CP. Software Protection Against Fault and Side Channel Attacks. [Internet] [Masters thesis]. Virginia Tech; 2017. [cited 2020 Dec 02]. Available from: http://hdl.handle.net/10919/78685.

Council of Science Editors:

Patrick CP. Software Protection Against Fault and Side Channel Attacks. [Masters Thesis]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/78685


Université Catholique de Louvain

9. Poussier, Romain. Key enumeration, rank estimation and horizontal side-channel attacks.

Degree: 2018, Université Catholique de Louvain

Since their discovery in the late 90's, side-channel attacks have been shown to be a great threat to the security of cryptographic implementations. In addition… (more)

Subjects/Keywords: Cryptography; Side-Channel Attacks; Key Enumeration; Rank Estimation; Horizontal Attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Poussier, R. (2018). Key enumeration, rank estimation and horizontal side-channel attacks. (Thesis). Université Catholique de Louvain. Retrieved from http://hdl.handle.net/2078.1/195707

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Poussier, Romain. “Key enumeration, rank estimation and horizontal side-channel attacks.” 2018. Thesis, Université Catholique de Louvain. Accessed December 02, 2020. http://hdl.handle.net/2078.1/195707.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Poussier, Romain. “Key enumeration, rank estimation and horizontal side-channel attacks.” 2018. Web. 02 Dec 2020.

Vancouver:

Poussier R. Key enumeration, rank estimation and horizontal side-channel attacks. [Internet] [Thesis]. Université Catholique de Louvain; 2018. [cited 2020 Dec 02]. Available from: http://hdl.handle.net/2078.1/195707.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Poussier R. Key enumeration, rank estimation and horizontal side-channel attacks. [Thesis]. Université Catholique de Louvain; 2018. Available from: http://hdl.handle.net/2078.1/195707

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Inci, Mehmet Sinan. Micro-architectural Threats to Modern Computing Systems.

Degree: PhD, 2019, Worcester Polytechnic Institute

 With the abundance of cheap computing power and high-speed internet, cloud and mobile computing replaced traditional computers. As computing models evolved, newer CPUs were fitted… (more)

Subjects/Keywords: cloud security; DoS attacks; machine learning; mobile security; side-channel attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Inci, M. S. (2019). Micro-architectural Threats to Modern Computing Systems. (Doctoral Dissertation). Worcester Polytechnic Institute. Retrieved from etd-042519-121209 ; https://digitalcommons.wpi.edu/etd-dissertations/528

Chicago Manual of Style (16th Edition):

Inci, Mehmet Sinan. “Micro-architectural Threats to Modern Computing Systems.” 2019. Doctoral Dissertation, Worcester Polytechnic Institute. Accessed December 02, 2020. etd-042519-121209 ; https://digitalcommons.wpi.edu/etd-dissertations/528.

MLA Handbook (7th Edition):

Inci, Mehmet Sinan. “Micro-architectural Threats to Modern Computing Systems.” 2019. Web. 02 Dec 2020.

Vancouver:

Inci MS. Micro-architectural Threats to Modern Computing Systems. [Internet] [Doctoral dissertation]. Worcester Polytechnic Institute; 2019. [cited 2020 Dec 02]. Available from: etd-042519-121209 ; https://digitalcommons.wpi.edu/etd-dissertations/528.

Council of Science Editors:

Inci MS. Micro-architectural Threats to Modern Computing Systems. [Doctoral Dissertation]. Worcester Polytechnic Institute; 2019. Available from: etd-042519-121209 ; https://digitalcommons.wpi.edu/etd-dissertations/528


Virginia Tech

11. Kiaei, Pantea. Architecture Support for Countermeasures against Side-Channel Analysis and Fault Attack.

Degree: MS, Computer Engineering, 2019, Virginia Tech

 Ciphers are algorithms designed by mathematicians. They protect data by encrypting them. In one of the main categories of these ciphers, called symmetric-key ciphers, a… (more)

Subjects/Keywords: Side-channel attacks; Fault attacks; Custom-instruction extensions; Bitslicing; Software countermeasures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kiaei, P. (2019). Architecture Support for Countermeasures against Side-Channel Analysis and Fault Attack. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/93537

Chicago Manual of Style (16th Edition):

Kiaei, Pantea. “Architecture Support for Countermeasures against Side-Channel Analysis and Fault Attack.” 2019. Masters Thesis, Virginia Tech. Accessed December 02, 2020. http://hdl.handle.net/10919/93537.

MLA Handbook (7th Edition):

Kiaei, Pantea. “Architecture Support for Countermeasures against Side-Channel Analysis and Fault Attack.” 2019. Web. 02 Dec 2020.

Vancouver:

Kiaei P. Architecture Support for Countermeasures against Side-Channel Analysis and Fault Attack. [Internet] [Masters thesis]. Virginia Tech; 2019. [cited 2020 Dec 02]. Available from: http://hdl.handle.net/10919/93537.

Council of Science Editors:

Kiaei P. Architecture Support for Countermeasures against Side-Channel Analysis and Fault Attack. [Masters Thesis]. Virginia Tech; 2019. Available from: http://hdl.handle.net/10919/93537


Delft University of Technology

12. Frigo, Pietro (author). Practical Microarchitectural Attacks from Integrated GPUs.

Degree: 2017, Delft University of Technology

 Dark silicon is pushing processor vendors to add more specialized units such as accelerators to commodity processor chips. Unfortunately this is done without enough care… (more)

Subjects/Keywords: Microarchitectural Attacks; Integrated GPUs; Mobile Security; Side-Channel Attacks; Rowhammer Attacks; ARM

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Frigo, P. (. (2017). Practical Microarchitectural Attacks from Integrated GPUs. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:c0d3c629-4c67-4741-9776-05802d89872f

Chicago Manual of Style (16th Edition):

Frigo, Pietro (author). “Practical Microarchitectural Attacks from Integrated GPUs.” 2017. Masters Thesis, Delft University of Technology. Accessed December 02, 2020. http://resolver.tudelft.nl/uuid:c0d3c629-4c67-4741-9776-05802d89872f.

MLA Handbook (7th Edition):

Frigo, Pietro (author). “Practical Microarchitectural Attacks from Integrated GPUs.” 2017. Web. 02 Dec 2020.

Vancouver:

Frigo P(. Practical Microarchitectural Attacks from Integrated GPUs. [Internet] [Masters thesis]. Delft University of Technology; 2017. [cited 2020 Dec 02]. Available from: http://resolver.tudelft.nl/uuid:c0d3c629-4c67-4741-9776-05802d89872f.

Council of Science Editors:

Frigo P(. Practical Microarchitectural Attacks from Integrated GPUs. [Masters Thesis]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:c0d3c629-4c67-4741-9776-05802d89872f


Uppsala University

13. Lindqvist, Maria. Dynamic Eviction Set Algorithms and Their Applicability to Cache Characterisation.

Degree: Information Technology, 2020, Uppsala University

  Eviction sets are groups of memory addresses that map to the same cache set. They can be used to perform efficient information-leaking attacks against… (more)

Subjects/Keywords: microarchitectural attacks; cache attacks; side channel attacks; eviction set; cache memory; Computer Engineering; Datorteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lindqvist, M. (2020). Dynamic Eviction Set Algorithms and Their Applicability to Cache Characterisation. (Thesis). Uppsala University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420317

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lindqvist, Maria. “Dynamic Eviction Set Algorithms and Their Applicability to Cache Characterisation.” 2020. Thesis, Uppsala University. Accessed December 02, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420317.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lindqvist, Maria. “Dynamic Eviction Set Algorithms and Their Applicability to Cache Characterisation.” 2020. Web. 02 Dec 2020.

Vancouver:

Lindqvist M. Dynamic Eviction Set Algorithms and Their Applicability to Cache Characterisation. [Internet] [Thesis]. Uppsala University; 2020. [cited 2020 Dec 02]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420317.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lindqvist M. Dynamic Eviction Set Algorithms and Their Applicability to Cache Characterisation. [Thesis]. Uppsala University; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420317

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Ordas, Sébastien. Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks.

Degree: Docteur es, Systèmes automatiques et microélectroniques, 2015, Montpellier

La consommation des circuits intégrés n'a cessé d'augmenter cette dernière décennie. Avec l'augmentation du prix de l'énergie et la démocratisation des systèmes embarqués, des méthodes… (more)

Subjects/Keywords: Attaques; Side-Channel; Consommation; Injection de fautes; Attacks; Side-Channel; Power Consumption; Faults injection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ordas, S. (2015). Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks. (Doctoral Dissertation). Montpellier. Retrieved from http://www.theses.fr/2015MONTS023

Chicago Manual of Style (16th Edition):

Ordas, Sébastien. “Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks.” 2015. Doctoral Dissertation, Montpellier. Accessed December 02, 2020. http://www.theses.fr/2015MONTS023.

MLA Handbook (7th Edition):

Ordas, Sébastien. “Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks.” 2015. Web. 02 Dec 2020.

Vancouver:

Ordas S. Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks. [Internet] [Doctoral dissertation]. Montpellier; 2015. [cited 2020 Dec 02]. Available from: http://www.theses.fr/2015MONTS023.

Council of Science Editors:

Ordas S. Évaluation de méthodes faible consommation contre les attaques matérielles : Evaluation of low power methods against hardware attacks. [Doctoral Dissertation]. Montpellier; 2015. Available from: http://www.theses.fr/2015MONTS023


Delft University of Technology

15. Tubbing, Rico (author). An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings.

Degree: 2019, Delft University of Technology

A side-channel attack (SCA) recovers secret data from a device by exploiting unintended physical leakages such as power consumption. In a profiled SCA, we assume… (more)

Subjects/Keywords: Side-Channel Attacks; Deep Learning; Profiled Side-channel Attack; Convolutional Neural Networks; Spread; Portability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tubbing, R. (. (2019). An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232

Chicago Manual of Style (16th Edition):

Tubbing, Rico (author). “An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings.” 2019. Masters Thesis, Delft University of Technology. Accessed December 02, 2020. http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232.

MLA Handbook (7th Edition):

Tubbing, Rico (author). “An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings.” 2019. Web. 02 Dec 2020.

Vancouver:

Tubbing R(. An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Dec 02]. Available from: http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232.

Council of Science Editors:

Tubbing R(. An Analysis of Deep Learning Based Profiled Side-channel Attacks: Custom Deep Learning Layer, CNN Hyperparameters for Countermeasures, and Portability Settings. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:a2179003-b00b-495e-8f2f-225562e65232


Virginia Tech

16. Sinha, Ambuj Sudhir. Design Techniques for Side-channel Resistant Embedded Software.

Degree: MS, Electrical and Computer Engineering, 2011, Virginia Tech

Side Channel Attacks (SCA) are a class of passive attacks on cryptosystems that exploit implementation characteristics of the system. Currently, a lot of research is… (more)

Subjects/Keywords: Bitslice Cryptography; Side Channel Attacks; Virtual Secure Circuit; Secure Embedded Systems; Side-channel Countermeasures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sinha, A. S. (2011). Design Techniques for Side-channel Resistant Embedded Software. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/34465

Chicago Manual of Style (16th Edition):

Sinha, Ambuj Sudhir. “Design Techniques for Side-channel Resistant Embedded Software.” 2011. Masters Thesis, Virginia Tech. Accessed December 02, 2020. http://hdl.handle.net/10919/34465.

MLA Handbook (7th Edition):

Sinha, Ambuj Sudhir. “Design Techniques for Side-channel Resistant Embedded Software.” 2011. Web. 02 Dec 2020.

Vancouver:

Sinha AS. Design Techniques for Side-channel Resistant Embedded Software. [Internet] [Masters thesis]. Virginia Tech; 2011. [cited 2020 Dec 02]. Available from: http://hdl.handle.net/10919/34465.

Council of Science Editors:

Sinha AS. Design Techniques for Side-channel Resistant Embedded Software. [Masters Thesis]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/34465


University of California – Irvine

17. Crane, Stephen. Enhancing and Extending Software Diversity.

Degree: Computer Science, 2015, University of California – Irvine

 Software immunity through diversity is a promising research direction. Address Space Layout Randomization has been widely deployed to defend against code-reuse attacks and significantly raises… (more)

Subjects/Keywords: Computer science; Code-reuse Attacks; Computer Security; Side-channel Attacks; Software Defenses; Software Diversity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Crane, S. (2015). Enhancing and Extending Software Diversity. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/45w3n70k

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Crane, Stephen. “Enhancing and Extending Software Diversity.” 2015. Thesis, University of California – Irvine. Accessed December 02, 2020. http://www.escholarship.org/uc/item/45w3n70k.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Crane, Stephen. “Enhancing and Extending Software Diversity.” 2015. Web. 02 Dec 2020.

Vancouver:

Crane S. Enhancing and Extending Software Diversity. [Internet] [Thesis]. University of California – Irvine; 2015. [cited 2020 Dec 02]. Available from: http://www.escholarship.org/uc/item/45w3n70k.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Crane S. Enhancing and Extending Software Diversity. [Thesis]. University of California – Irvine; 2015. Available from: http://www.escholarship.org/uc/item/45w3n70k

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

18. Ahmad, Mohammad. Cauldron: a framework to defend against cache-based side-channel attacks in clouds.

Degree: MS, Computer Science, 2016, University of Illinois – Urbana-Champaign

 Cache-based side-channel attacks have garnered much interest in recent literature. Such attacks are particularly relevant for cloud computing platforms due to high levels of multi-tenancy.… (more)

Subjects/Keywords: Cache-based side-channel attacks; Cloud computing; Containers; Virtualization; Docker

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ahmad, M. (2016). Cauldron: a framework to defend against cache-based side-channel attacks in clouds. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/90967

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ahmad, Mohammad. “Cauldron: a framework to defend against cache-based side-channel attacks in clouds.” 2016. Thesis, University of Illinois – Urbana-Champaign. Accessed December 02, 2020. http://hdl.handle.net/2142/90967.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ahmad, Mohammad. “Cauldron: a framework to defend against cache-based side-channel attacks in clouds.” 2016. Web. 02 Dec 2020.

Vancouver:

Ahmad M. Cauldron: a framework to defend against cache-based side-channel attacks in clouds. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2016. [cited 2020 Dec 02]. Available from: http://hdl.handle.net/2142/90967.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ahmad M. Cauldron: a framework to defend against cache-based side-channel attacks in clouds. [Thesis]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/90967

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Urbana-Champaign

19. Wang, He. Applying multimodal sensing to human location estimation.

Degree: PhD, Electrical & Computer Engr, 2016, University of Illinois – Urbana-Champaign

 Mobile devices like smartphones and smartwatches are beginning to "stick" to the human body. Given that these devices are equipped with a variety of sensors,… (more)

Subjects/Keywords: sensing; location; visual fingerprinting; motion leaks; side-channel attacks; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, H. (2016). Applying multimodal sensing to human location estimation. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/92743

Chicago Manual of Style (16th Edition):

Wang, He. “Applying multimodal sensing to human location estimation.” 2016. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed December 02, 2020. http://hdl.handle.net/2142/92743.

MLA Handbook (7th Edition):

Wang, He. “Applying multimodal sensing to human location estimation.” 2016. Web. 02 Dec 2020.

Vancouver:

Wang H. Applying multimodal sensing to human location estimation. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2016. [cited 2020 Dec 02]. Available from: http://hdl.handle.net/2142/92743.

Council of Science Editors:

Wang H. Applying multimodal sensing to human location estimation. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2016. Available from: http://hdl.handle.net/2142/92743

20. Shahverdi, Aria. Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON.

Degree: MS, 2015, Worcester Polytechnic Institute

 "Securing data transmission has always been a challenge. While many cryptographic algorithms are available to solve the problem, many applications have tough area constraints while… (more)

Subjects/Keywords: cryptography; side-channel attacks; lightweight cryptography; SIMON; threshold implementation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shahverdi, A. (2015). Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON. (Thesis). Worcester Polytechnic Institute. Retrieved from etd-082615-144746 ; https://digitalcommons.wpi.edu/etd-theses/985

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shahverdi, Aria. “Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON.” 2015. Thesis, Worcester Polytechnic Institute. Accessed December 02, 2020. etd-082615-144746 ; https://digitalcommons.wpi.edu/etd-theses/985.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shahverdi, Aria. “Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON.” 2015. Web. 02 Dec 2020.

Vancouver:

Shahverdi A. Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON. [Internet] [Thesis]. Worcester Polytechnic Institute; 2015. [cited 2020 Dec 02]. Available from: etd-082615-144746 ; https://digitalcommons.wpi.edu/etd-theses/985.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shahverdi A. Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON. [Thesis]. Worcester Polytechnic Institute; 2015. Available from: etd-082615-144746 ; https://digitalcommons.wpi.edu/etd-theses/985

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Clemson University

21. Janefalkar, Tushar. TOWARDS SECURING VIRTUALIZATION USING A RECONFIGURABLE PLATFORM.

Degree: MS, Computer Engineering, 2011, Clemson University

 Virtualization is no longer limited to main stream processors and servers. Virtualization software for General Purpose Processors (GPP) that allow one Operating System (OS) to… (more)

Subjects/Keywords: FPGA; Hardware security; Side-channel attacks; Virtualization; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Janefalkar, T. (2011). TOWARDS SECURING VIRTUALIZATION USING A RECONFIGURABLE PLATFORM. (Masters Thesis). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_theses/1063

Chicago Manual of Style (16th Edition):

Janefalkar, Tushar. “TOWARDS SECURING VIRTUALIZATION USING A RECONFIGURABLE PLATFORM.” 2011. Masters Thesis, Clemson University. Accessed December 02, 2020. https://tigerprints.clemson.edu/all_theses/1063.

MLA Handbook (7th Edition):

Janefalkar, Tushar. “TOWARDS SECURING VIRTUALIZATION USING A RECONFIGURABLE PLATFORM.” 2011. Web. 02 Dec 2020.

Vancouver:

Janefalkar T. TOWARDS SECURING VIRTUALIZATION USING A RECONFIGURABLE PLATFORM. [Internet] [Masters thesis]. Clemson University; 2011. [cited 2020 Dec 02]. Available from: https://tigerprints.clemson.edu/all_theses/1063.

Council of Science Editors:

Janefalkar T. TOWARDS SECURING VIRTUALIZATION USING A RECONFIGURABLE PLATFORM. [Masters Thesis]. Clemson University; 2011. Available from: https://tigerprints.clemson.edu/all_theses/1063


University of Cincinnati

22. Gohil, Nikhil N. Design of DPA-Resistant Integrated Circuits.

Degree: MS, Engineering and Applied Science: Electrical Engineering, 2017, University of Cincinnati

 During the recent past, Integrated Circuit (IC) technology has grown by leaps and bounds, with modern circuits capable of performing tasks at an extremely efficient… (more)

Subjects/Keywords: Engineering; Hardware Security; SDMLp; DPA; Side Channel Attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gohil, N. N. (2017). Design of DPA-Resistant Integrated Circuits. (Masters Thesis). University of Cincinnati. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=ucin1516622822794541

Chicago Manual of Style (16th Edition):

Gohil, Nikhil N. “Design of DPA-Resistant Integrated Circuits.” 2017. Masters Thesis, University of Cincinnati. Accessed December 02, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1516622822794541.

MLA Handbook (7th Edition):

Gohil, Nikhil N. “Design of DPA-Resistant Integrated Circuits.” 2017. Web. 02 Dec 2020.

Vancouver:

Gohil NN. Design of DPA-Resistant Integrated Circuits. [Internet] [Masters thesis]. University of Cincinnati; 2017. [cited 2020 Dec 02]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1516622822794541.

Council of Science Editors:

Gohil NN. Design of DPA-Resistant Integrated Circuits. [Masters Thesis]. University of Cincinnati; 2017. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=ucin1516622822794541


Princeton University

23. Liu, Fangfei. Cache Side Channel Attacks and Secure Cache Architectures .

Degree: PhD, 2016, Princeton University

 With the number of cyber attacks escalating, it is crucial to protect the confidentiality and integrity of data and programs in our networked computer systems.… (more)

Subjects/Keywords: cache; commputer architecture; information leakage; security; side channel attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, F. (2016). Cache Side Channel Attacks and Secure Cache Architectures . (Doctoral Dissertation). Princeton University. Retrieved from http://arks.princeton.edu/ark:/88435/dsp01h415pd02s

Chicago Manual of Style (16th Edition):

Liu, Fangfei. “Cache Side Channel Attacks and Secure Cache Architectures .” 2016. Doctoral Dissertation, Princeton University. Accessed December 02, 2020. http://arks.princeton.edu/ark:/88435/dsp01h415pd02s.

MLA Handbook (7th Edition):

Liu, Fangfei. “Cache Side Channel Attacks and Secure Cache Architectures .” 2016. Web. 02 Dec 2020.

Vancouver:

Liu F. Cache Side Channel Attacks and Secure Cache Architectures . [Internet] [Doctoral dissertation]. Princeton University; 2016. [cited 2020 Dec 02]. Available from: http://arks.princeton.edu/ark:/88435/dsp01h415pd02s.

Council of Science Editors:

Liu F. Cache Side Channel Attacks and Secure Cache Architectures . [Doctoral Dissertation]. Princeton University; 2016. Available from: http://arks.princeton.edu/ark:/88435/dsp01h415pd02s


Université de Bordeaux I

24. Andouard, Philippe. Outils d'aide à la recherche de vulnérabilités dans l'implantation d'applications embarquées sur carte à puce : New generation of high dynamic range vision systems.

Degree: Docteur es, Informatique, 2009, Université de Bordeaux I

Les travaux présentés dans cette thèse ont pour objectif de faciliter les évaluations sécuritaires des logiciels embarqués dans les cartes à puce. En premier lieu,… (more)

Subjects/Keywords: Carte à puce; Sécurité; Side channel attacks; Langage d'assemblage AVR; Langage C; Smartcard; Security; Microcontrollers; Side channel attacks; AVR assembly language; C language

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andouard, P. (2009). Outils d'aide à la recherche de vulnérabilités dans l'implantation d'applications embarquées sur carte à puce : New generation of high dynamic range vision systems. (Doctoral Dissertation). Université de Bordeaux I. Retrieved from http://www.theses.fr/2009BOR13958

Chicago Manual of Style (16th Edition):

Andouard, Philippe. “Outils d'aide à la recherche de vulnérabilités dans l'implantation d'applications embarquées sur carte à puce : New generation of high dynamic range vision systems.” 2009. Doctoral Dissertation, Université de Bordeaux I. Accessed December 02, 2020. http://www.theses.fr/2009BOR13958.

MLA Handbook (7th Edition):

Andouard, Philippe. “Outils d'aide à la recherche de vulnérabilités dans l'implantation d'applications embarquées sur carte à puce : New generation of high dynamic range vision systems.” 2009. Web. 02 Dec 2020.

Vancouver:

Andouard P. Outils d'aide à la recherche de vulnérabilités dans l'implantation d'applications embarquées sur carte à puce : New generation of high dynamic range vision systems. [Internet] [Doctoral dissertation]. Université de Bordeaux I; 2009. [cited 2020 Dec 02]. Available from: http://www.theses.fr/2009BOR13958.

Council of Science Editors:

Andouard P. Outils d'aide à la recherche de vulnérabilités dans l'implantation d'applications embarquées sur carte à puce : New generation of high dynamic range vision systems. [Doctoral Dissertation]. Université de Bordeaux I; 2009. Available from: http://www.theses.fr/2009BOR13958


University of Bristol

25. Green, Joseph A. F. A study of inference-based attacks with neural network classifiers.

Degree: PhD, 2019, University of Bristol

 Belief Propagation is a message-passing algorithm used to propagate information in probabilistic graphical models. In 2014 it was shown that, in theory, Belief Propagation can… (more)

Subjects/Keywords: 004; Belief Propagation; Cryptography; Python; Side Channel Attacks; Deep Learning; Machine Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Green, J. A. F. (2019). A study of inference-based attacks with neural network classifiers. (Doctoral Dissertation). University of Bristol. Retrieved from http://hdl.handle.net/1983/de93265f-81c8-40e6-bbbc-b20514f8a47d

Chicago Manual of Style (16th Edition):

Green, Joseph A F. “A study of inference-based attacks with neural network classifiers.” 2019. Doctoral Dissertation, University of Bristol. Accessed December 02, 2020. http://hdl.handle.net/1983/de93265f-81c8-40e6-bbbc-b20514f8a47d.

MLA Handbook (7th Edition):

Green, Joseph A F. “A study of inference-based attacks with neural network classifiers.” 2019. Web. 02 Dec 2020.

Vancouver:

Green JAF. A study of inference-based attacks with neural network classifiers. [Internet] [Doctoral dissertation]. University of Bristol; 2019. [cited 2020 Dec 02]. Available from: http://hdl.handle.net/1983/de93265f-81c8-40e6-bbbc-b20514f8a47d.

Council of Science Editors:

Green JAF. A study of inference-based attacks with neural network classifiers. [Doctoral Dissertation]. University of Bristol; 2019. Available from: http://hdl.handle.net/1983/de93265f-81c8-40e6-bbbc-b20514f8a47d

26. Αντωνόπουλος, Αλέξανδρος. Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές.

Degree: 2009, University of Patras

H διατριβή αντιμετωπίζει το πρόβλημα της σχεδίασης ασφαλών υποσυστημάτων που μπορούν να υπάρξουν σε μη-εμπιστεύσιμα συστήματα διασφαλίζοντας τη δική τους ασφάλεια στο μεγαλύτερο δυνατό βαθμό.… (more)

Subjects/Keywords: Ασφάλεια; Αρχιτεκτονική ασφαλείας; Επιθέσεις πλαγίου καναλιού; 005.8; Security; Security architecture; Side-channel attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Αντωνόπουλος, . (2009). Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές. (Doctoral Dissertation). University of Patras. Retrieved from http://hdl.handle.net/10889/6841

Chicago Manual of Style (16th Edition):

Αντωνόπουλος, Αλέξανδρος. “Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές.” 2009. Doctoral Dissertation, University of Patras. Accessed December 02, 2020. http://hdl.handle.net/10889/6841.

MLA Handbook (7th Edition):

Αντωνόπουλος, Αλέξανδρος. “Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές.” 2009. Web. 02 Dec 2020.

Vancouver:

Αντωνόπουλος . Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές. [Internet] [Doctoral dissertation]. University of Patras; 2009. [cited 2020 Dec 02]. Available from: http://hdl.handle.net/10889/6841.

Council of Science Editors:

Αντωνόπουλος . Παροχή ασφαλών υπηρεσιών με φερέγγυες υποδομές. [Doctoral Dissertation]. University of Patras; 2009. Available from: http://hdl.handle.net/10889/6841

27. Alsibyani, Hassan M. Enhancing Network Data Obliviousness in Trusted Execution Environment-based Stream Processing Systems.

Degree: 2018, King Abdullah University of Science and Technology

 Cloud computing usage is increasing and a common concern is the privacy and security of the data and computation. Third party cloud environments are not… (more)

Subjects/Keywords: systems; security; side-channel attacks

…give any guarantees regarding some known side-channel attacks. The side-channel attack we are… …both on SGX and side-channels. 2.2 Applications and side channel attacks Since the… …environment. On the other hand, several works explored side-channel attacks that are feasible… …leakage due to side-channel attacks can also be used for building an SGX based stream processing… …TEE. Mitigation techniques discussed in prior works against side-channel attacks do not… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alsibyani, H. M. (2018). Enhancing Network Data Obliviousness in Trusted Execution Environment-based Stream Processing Systems. (Thesis). King Abdullah University of Science and Technology. Retrieved from http://hdl.handle.net/10754/627880

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Alsibyani, Hassan M. “Enhancing Network Data Obliviousness in Trusted Execution Environment-based Stream Processing Systems.” 2018. Thesis, King Abdullah University of Science and Technology. Accessed December 02, 2020. http://hdl.handle.net/10754/627880.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Alsibyani, Hassan M. “Enhancing Network Data Obliviousness in Trusted Execution Environment-based Stream Processing Systems.” 2018. Web. 02 Dec 2020.

Vancouver:

Alsibyani HM. Enhancing Network Data Obliviousness in Trusted Execution Environment-based Stream Processing Systems. [Internet] [Thesis]. King Abdullah University of Science and Technology; 2018. [cited 2020 Dec 02]. Available from: http://hdl.handle.net/10754/627880.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Alsibyani HM. Enhancing Network Data Obliviousness in Trusted Execution Environment-based Stream Processing Systems. [Thesis]. King Abdullah University of Science and Technology; 2018. Available from: http://hdl.handle.net/10754/627880

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. Carmona, Manuel Bejarano. A simple and low cost platform to perform Power Analysis Attacks.

Degree: 2012, , School of Engineering

  Power Analysis Attacks use the fact that power consumption in modern microprocessors and cryptographic devices depends on the instructions executed on them and so,… (more)

Subjects/Keywords: power analysis side channel attacks spa dpa simple differential; Computer Sciences; Datavetenskap (datalogi); Telecommunications; Telekommunikation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carmona, M. B. (2012). A simple and low cost platform to perform Power Analysis Attacks. (Thesis). , School of Engineering. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Carmona, Manuel Bejarano. “A simple and low cost platform to perform Power Analysis Attacks.” 2012. Thesis, , School of Engineering. Accessed December 02, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Carmona, Manuel Bejarano. “A simple and low cost platform to perform Power Analysis Attacks.” 2012. Web. 02 Dec 2020.

Vancouver:

Carmona MB. A simple and low cost platform to perform Power Analysis Attacks. [Internet] [Thesis]. , School of Engineering; 2012. [cited 2020 Dec 02]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Carmona MB. A simple and low cost platform to perform Power Analysis Attacks. [Thesis]. , School of Engineering; 2012. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Jauvart, Damien. Sécurisation des algorithmes de couplages contre les attaques physiques : Security of pairing algorithms against physical attacks.

Degree: Docteur es, Informatique, 2017, Université Paris-Saclay (ComUE)

Cette thèse est consacrée à l’étude de la sécurité physique des algorithmesde couplage. Les algorithmes de couplage sont depuis une quinzaine d’années utilisésà des fins… (more)

Subjects/Keywords: Cryptographie; Couplages; Attaques par canaux auxiliaires; Contre-Mesures; Cryptography; Pairings; Side-Channel attacks; Countermeasures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jauvart, D. (2017). Sécurisation des algorithmes de couplages contre les attaques physiques : Security of pairing algorithms against physical attacks. (Doctoral Dissertation). Université Paris-Saclay (ComUE). Retrieved from http://www.theses.fr/2017SACLV059

Chicago Manual of Style (16th Edition):

Jauvart, Damien. “Sécurisation des algorithmes de couplages contre les attaques physiques : Security of pairing algorithms against physical attacks.” 2017. Doctoral Dissertation, Université Paris-Saclay (ComUE). Accessed December 02, 2020. http://www.theses.fr/2017SACLV059.

MLA Handbook (7th Edition):

Jauvart, Damien. “Sécurisation des algorithmes de couplages contre les attaques physiques : Security of pairing algorithms against physical attacks.” 2017. Web. 02 Dec 2020.

Vancouver:

Jauvart D. Sécurisation des algorithmes de couplages contre les attaques physiques : Security of pairing algorithms against physical attacks. [Internet] [Doctoral dissertation]. Université Paris-Saclay (ComUE); 2017. [cited 2020 Dec 02]. Available from: http://www.theses.fr/2017SACLV059.

Council of Science Editors:

Jauvart D. Sécurisation des algorithmes de couplages contre les attaques physiques : Security of pairing algorithms against physical attacks. [Doctoral Dissertation]. Université Paris-Saclay (ComUE); 2017. Available from: http://www.theses.fr/2017SACLV059


Delft University of Technology

30. Pop, Marius (author). Interpreting Information of Deep Neural Networks for Profiled Side Channel Analysis.

Degree: 2019, Delft University of Technology

Security has become ever more important in today's quickly growing digital world as the number of digital assets has quickly grown. Our thesis focuses on… (more)

Subjects/Keywords: Side-Channel Attacks; Deep Learning; Mutual Information; Convolutional Neural Network; Neural Network; Machine Learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pop, M. (. (2019). Interpreting Information of Deep Neural Networks for Profiled Side Channel Analysis. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:f21cf646-fb91-4c2c-97bb-6bc6eb2f00c1

Chicago Manual of Style (16th Edition):

Pop, Marius (author). “Interpreting Information of Deep Neural Networks for Profiled Side Channel Analysis.” 2019. Masters Thesis, Delft University of Technology. Accessed December 02, 2020. http://resolver.tudelft.nl/uuid:f21cf646-fb91-4c2c-97bb-6bc6eb2f00c1.

MLA Handbook (7th Edition):

Pop, Marius (author). “Interpreting Information of Deep Neural Networks for Profiled Side Channel Analysis.” 2019. Web. 02 Dec 2020.

Vancouver:

Pop M(. Interpreting Information of Deep Neural Networks for Profiled Side Channel Analysis. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Dec 02]. Available from: http://resolver.tudelft.nl/uuid:f21cf646-fb91-4c2c-97bb-6bc6eb2f00c1.

Council of Science Editors:

Pop M(. Interpreting Information of Deep Neural Networks for Profiled Side Channel Analysis. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:f21cf646-fb91-4c2c-97bb-6bc6eb2f00c1

[1] [2] [3] [4]

.