Leveraging EM Side-Channels for Recognizing Components on a Motherboard
暂无分享,去创建一个
[1] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.
[2] M. Pecht,et al. Bogus: electronic manufacturing and consumers confront a rising tide of counterfeit electronics , 2006, IEEE Spectrum.
[3] Manfred Pinkal,et al. Acoustic Side-Channel Attacks on Printers , 2010, USENIX Security Symposium.
[4] Michael Hutter,et al. The Temperature Side Channel and Heating Fault Attacks , 2013, CARDIS.
[5] Milos Prvulovic,et al. Comparison of electromagnetic side-channel energy available to the attacker from different computer systems , 2015, 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC).
[6] Milos Prvulovic,et al. EDDIE: EM-based detection of deviations in program execution , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).
[7] Milos Prvulovic,et al. EMPROF: Memory Profiling Via EM-Emanation in IoT and Hand-Held Devices , 2018, 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[8] Daniel Genkin,et al. Get your hands off my laptop: physical side-channel key-extraction attacks on PCs , 2015, Journal of Cryptographic Engineering.
[9] Milos Prvulovic,et al. A Method for Finding Frequency-Modulated and Amplitude-Modulated Electromagnetic Emanations in Computer Systems , 2017, IEEE Transactions on Electromagnetic Compatibility.
[10] Baki Berkay Yilmaz,et al. Detecting Cellphone Camera Status at Distance by Exploiting Electromagnetic Emanations , 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM).
[11] Nathalie Kae-Nune,et al. Qualification and testing process to implement anti-counterfeiting technologies into IC packages , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[12] Claudia Beleites,et al. Variance reduction in estimating classification error using sparse datasets , 2005 .
[13] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[14] Etienne Perret,et al. Towards a robust and efficient EM based authentication of FPGA against counterfeiting and recycling , 2017, 2017 19th International Symposium on Computer Architecture and Digital Systems (CADS).
[15] Srinivas Devadas,et al. Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.
[16] Nick Knupffer. Intel Corporation , 2018, The Grants Register 2019.
[17] Donald C. Wunsch,et al. Detection and Identification of Vehicles Based on Their Spark-Free Unintended Electromagnetic Emissions , 2018, IEEE Transactions on Electromagnetic Compatibility.
[18] Etienne Perret,et al. Authentication of Microcontroller Board Using Non-Invasive EM Emission Technique , 2018, 2018 IEEE 3rd International Verification and Security Workshop (IVSW).
[19] Milos Prvulovic,et al. A Method for Efficient Localization of Magnetic Field Sources Excited by Execution of Instructions in a Processor , 2018, IEEE Transactions on Electromagnetic Compatibility.
[20] Mark Mohammad Tehranipoor,et al. Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain , 2014, Proceedings of the IEEE.
[21] Alanson P. Sample,et al. EM-ID: Tag-less identification of electrical devices via electromagnetic emissions , 2016, 2016 IEEE International Conference on RFID (RFID).
[22] Milos Prvulovic,et al. A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events , 2014, 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture.
[23] Thomas P. Karnowski,et al. A Dimensionally Aligned Signal Projection for Classification of Unintended Radiated Emissions , 2018, IEEE Transactions on Electromagnetic Compatibility.
[24] Berk Sunar,et al. Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[25] Wim van Eck,et al. Electromagnetic radiation from video display units: An eavesdropping risk? , 1985, Comput. Secur..
[26] Milos Prvulovic,et al. Creating a Backscattering Side Channel to Enable Detection of Dormant Hardware Trojans , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[27] Thomas P. Karnowski,et al. Classification of Unintended Radiated Emissions in a Multi-Device Environment , 2019, IEEE Transactions on Smart Grid.
[28] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[29] Gierad Laput,et al. EM-Sense: Touch Recognition of Uninstrumented, Electrical and Electromechanical Objects , 2015, UIST.
[30] Markus G. Kuhn,et al. Compromising Emanations , 2002, Encyclopedia of Cryptography and Security.
[31] Milos Prvulovic,et al. FASE: Finding Amplitude-modulated Side-channel Emanations , 2015, 2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA).
[32] Milos Prvulovic,et al. An algorithm for finding carriers of amplitude-modulated electromagnetic emanations in computer systems , 2016, 2016 10th European Conference on Antennas and Propagation (EuCAP).
[33] Haider Adnan Khan,et al. Malware Detection in Embedded Systems Using Neural Network Model for Electromagnetic Side-Channel Signals , 2019, Journal of Hardware and Systems Security.
[34] Milos Prvulovic,et al. REMOTE: Robust External Malware Detection Framework by Using Electromagnetic Signals , 2020, IEEE Transactions on Computers.
[35] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[36] Chenglu Jin,et al. Secure and Efficient Initialization and Authentication Protocols for SHIELD , 2019, IEEE Transactions on Dependable and Secure Computing.
[37] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[38] Milos Prvulovic,et al. A Comparison of Backscattering, EM, and Power Side-Channels and Their Performance in Detecting Software and Hardware Intrusions , 2020, Journal of Hardware and Systems Security.
[39] Baki Berkay Yilmaz,et al. A novel clustering technique using backscattering side channel for counterfeit IC detection , 2020, Defense + Commercial Sensing.
[40] Milos Prvulovic,et al. One&Done: A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA , 2018, USENIX Security Symposium.
[41] 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE) , 2023, 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[42] Jason Helge Anderson,et al. A PUF design for secure FPGA-based embedded systems , 2010, 2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC).
[43] Mark Mohammad Tehranipoor,et al. Aging analysis for recycled FPGA detection , 2014, 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT).