Information leakage chaff: Feeding red herrings to side channel attackers
暂无分享,去创建一个
[1] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[2] Christof Paar,et al. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008, CRYPTO.
[3] Giovanni Agosta,et al. A code morphing methodology to automate power analysis countermeasures , 2012, DAC Design Automation Conference 2012.
[4] Thomas Ristenpart,et al. Honey Encryption: Security Beyond the Brute-Force Bound , 2014, IACR Cryptol. ePrint Arch..
[5] Benedikt Heinz,et al. Localized Electromagnetic Analysis of Cryptographic Implementations , 2012, CT-RSA.
[6] Giovanni Agosta,et al. A multiple equivalent execution trace approach to secure cryptographic embedded software , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[7] Alessandro Barenghi,et al. On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs , 2011, CCS '11.
[8] Jean-Sébastien Coron,et al. Higher Order Masking of Look-up Tables , 2014, IACR Cryptol. ePrint Arch..
[9] Clifford Stoll,et al. Stalking the wily hacker , 1988, CACM.
[10] P. Rohatgi,et al. A testing methodology for side channel resistance , 2011 .
[11] Pankaj Rohatgi,et al. Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.
[12] Enrique Cantó,et al. Implementation on MicroBlaze of AES algorithm to reveal fake keys against side-channel attacks , 2014, 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE).
[13] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[14] Giovanni Agosta,et al. Compiler-based side channel vulnerability analysis and optimized countermeasures application , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).