ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code
2015 11th International Conference on Information Assurance and Security (IAS)
◽
10.1109/isias.2015.7492753
◽
2015
◽
Author(s):
Mohammed Amine Kasmi
◽
Mostafa Azizi
◽
Jean-Louis Lanet
Keyword(s):
Reverse Engineering
◽
Side Channel
◽
Side Channel Analysis
◽
Analysis Techniques
◽
Java Card
◽
Channel Analysis
Download Full-text
Related Documents
Cited By
References
Practical Reverse Engineering of Secret Sboxes by Side-Channel Analysis
2020 IEEE International Symposium on Circuits and Systems (ISCAS)
◽
10.1109/iscas45731.2020.9180848
◽
2020
◽
Author(s):
Dirmanto Jap
◽
Shivam Bhasin
Keyword(s):
Reverse Engineering
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Reverse engineering smart card malware using side channel analysis with machine learning techniques
2016 IEEE International Conference on Big Data (Big Data)
◽
10.1109/bigdata.2016.7841039
◽
2016
◽
Cited By ~ 2
Author(s):
Hippolyte Djonon Tsague
◽
Bheki Twala
Keyword(s):
Machine Learning
◽
Reverse Engineering
◽
Smart Card
◽
Machine Learning Techniques
◽
Side Channel
◽
Side Channel Analysis
◽
Learning Techniques
◽
Channel Analysis
Download Full-text
Practical operation extraction from electromagnetic leakage for side-channel analysis and reverse engineering
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
◽
10.1145/3395351.3399362
◽
2020
◽
Author(s):
Pieter Robyns
◽
Mariano Di Martino
◽
Dennis Giese
◽
Wim Lamotte
◽
Peter Quax
◽
...
Keyword(s):
Reverse Engineering
◽
Side Channel
◽
Side Channel Analysis
◽
Practical Operation
◽
Channel Analysis
Download Full-text
Side-channel Analysis Techniques for Hardware Trojans Detection
Hardware Security
◽
10.1201/b17555-21
◽
2014
◽
pp. 421-451
Keyword(s):
Side Channel
◽
Hardware Trojans
◽
Side Channel Analysis
◽
Analysis Techniques
◽
Channel Analysis
Download Full-text
When Reverse-Engineering Meets Side-Channel Analysis – Digital Lockpicking in Practice
Selected Areas in Cryptography -- SAC 2013 - Lecture Notes in Computer Science
◽
10.1007/978-3-662-43414-7_29
◽
2014
◽
pp. 571-588
◽
Cited By ~ 3
Author(s):
David Oswald
◽
Daehyun Strobel
◽
Falk Schellenberg
◽
Timo Kasper
◽
Christof Paar
Keyword(s):
Reverse Engineering
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
SCARE: Side-Channel Analysis Based Reverse Engineering for Post-Silicon Validation
2012 25th International Conference on VLSI Design
◽
10.1109/vlsid.2012.88
◽
2012
◽
Cited By ~ 3
Author(s):
Xinmu Wang
◽
Seetharam Narasimhan
◽
Aswin Krishna
◽
Swarup Bhunia
Keyword(s):
Reverse Engineering
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Parameters selection and optimization in profiled side channel analysis based on convolutional neural network
2020 IEEE 2nd International Conference on Civil Aviation Safety and Information Technology (ICCASIT
◽
10.1109/iccasit50869.2020.9368671
◽
2020
◽
Author(s):
Liu Linyun
◽
Chen Kaiyan
◽
Song Shijie
◽
Zhang Yang
◽
Liu Junyan
◽
...
Keyword(s):
Neural Network
◽
Convolutional Neural Network
◽
Side Channel
◽
Side Channel Analysis
◽
Parameters Selection
◽
Channel Analysis
Download Full-text
Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis
Proceedings of the 14th ACM SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems
◽
10.1145/2491899.2465570
◽
2013
◽
Cited By ~ 5
Author(s):
Carlos Moreno
◽
Sebastian Fischmeister
◽
M. Anwar Hasan
Keyword(s):
Embedded Systems
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel Analysis
2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)
◽
10.1109/asianhost51057.2020.9358263
◽
2020
◽
Author(s):
Huifeng Zhu
◽
Xiaolong Guo
◽
Yier Jin
◽
Xuan Zhang
Keyword(s):
Network Modeling
◽
Power Delivery
◽
Side Channel
◽
Modeling Framework
◽
Side Channel Analysis
◽
Cross Domain
◽
Power Delivery Network
◽
Channel Analysis
◽
Delivery Network
Download Full-text
You can detect but you cannot hide: Fault Assisted Side Channel Analysis on Protected Software-based Block Ciphers
2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)
◽
10.1109/dft50435.2020.9250870
◽
2020
◽
Keyword(s):
Block Ciphers
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close