ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis
Proceedings of the 14th ACM SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems
◽
10.1145/2491899.2465570
◽
2013
◽
Cited By ~ 5
Author(s):
Carlos Moreno
◽
Sebastian Fischmeister
◽
M. Anwar Hasan
Keyword(s):
Embedded Systems
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Related Documents
Cited By
References
Implementation of Side Channel Analysis Evaluation Boards for Cryptographic Software of Embedded Systems
Computer Science and its Applications - Lecture Notes in Electrical Engineering
◽
10.1007/978-3-662-45402-2_52
◽
2015
◽
pp. 343-348
Author(s):
Yongje Choi
◽
Dooho Choi
◽
Jaechul Ryu
Keyword(s):
Embedded Systems
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis
Proceedings of the 14th ACM SIGPLAN/SIGBED conference on Languages, compilers and tools for embedded systems
◽
10.1145/2465554.2465570
◽
2013
◽
Author(s):
Carlos Moreno
◽
Sebastian Fischmeister
◽
M. Anwar Hasan
Keyword(s):
Embedded Systems
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Security and Privacy in Communication Networks
◽
10.1007/978-3-319-28865-9_15
◽
2015
◽
pp. 277-293
◽
Cited By ~ 2
Author(s):
Hong Liu
◽
Hongmin Li
◽
Eugene Y. Vasserman
Keyword(s):
Embedded Systems
◽
Side Channel
◽
Side Channel Analysis
◽
Integrity Checking
◽
Software Integrity
◽
Channel Analysis
Download Full-text
Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis
ACM SIGPLAN Notices
◽
10.1145/2499369.2465570
◽
2013
◽
Vol 48
(5)
◽
pp. 77-88
◽
Cited By ~ 1
Author(s):
Carlos Moreno
◽
Sebastian Fischmeister
◽
M. Anwar Hasan
Keyword(s):
Embedded Systems
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Side-Channel Analysis of Embedded Systems
10.1007/978-3-030-77222-2
◽
2021
◽
Author(s):
Maamar Ouladj
◽
Sylvain Guilley
Keyword(s):
Embedded Systems
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Parameters selection and optimization in profiled side channel analysis based on convolutional neural network
2020 IEEE 2nd International Conference on Civil Aviation Safety and Information Technology (ICCASIT
◽
10.1109/iccasit50869.2020.9368671
◽
2020
◽
Author(s):
Liu Linyun
◽
Chen Kaiyan
◽
Song Shijie
◽
Zhang Yang
◽
Liu Junyan
◽
...
Keyword(s):
Neural Network
◽
Convolutional Neural Network
◽
Side Channel
◽
Side Channel Analysis
◽
Parameters Selection
◽
Channel Analysis
Download Full-text
PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel Analysis
2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)
◽
10.1109/asianhost51057.2020.9358263
◽
2020
◽
Author(s):
Huifeng Zhu
◽
Xiaolong Guo
◽
Yier Jin
◽
Xuan Zhang
Keyword(s):
Network Modeling
◽
Power Delivery
◽
Side Channel
◽
Modeling Framework
◽
Side Channel Analysis
◽
Cross Domain
◽
Power Delivery Network
◽
Channel Analysis
◽
Delivery Network
Download Full-text
You can detect but you cannot hide: Fault Assisted Side Channel Analysis on Protected Software-based Block Ciphers
2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)
◽
10.1109/dft50435.2020.9250870
◽
2020
◽
Keyword(s):
Block Ciphers
◽
Side Channel
◽
Side Channel Analysis
◽
Channel Analysis
Download Full-text
Side-channel analysis attacks based on deep learning network
Frontiers of Computer Science
◽
10.1007/s11704-020-0209-4
◽
2021
◽
Vol 16
(2)
◽
Author(s):
Yu Ou
◽
Lang Li
Keyword(s):
Deep Learning
◽
Side Channel
◽
Side Channel Analysis
◽
Learning Network
◽
Channel Analysis
◽
Deep Learning Network
Download Full-text
Side-Channel Analysis Attacks on Hardware Implementations of Cryptographic Algorithms
Wireless Security and Cryptography
◽
10.1201/9780849387692-15
◽
2017
◽
pp. 229-264
Keyword(s):
Side Channel
◽
Side Channel Analysis
◽
Hardware Implementations
◽
Cryptographic Algorithms
◽
Channel Analysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close