Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJune 2021
Deep Neural Exposure: You Can Run, But Not Hide Your Neural Network Architecture!
IH&MMSec '21: Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia SecurityPages 75–80https://doi.org/10.1145/3437880.3460415Deep Neural Networks (DNNs) are at the heart of many of today's most innovative technologies. With companies investing lots of resources to design, build and optimize these networks for their custom products, DNNs are now integral to many companies' ...
- research-articleNovember 2020
Neural network-based side channel attacks and countermeasures
DAC '20: Proceedings of the 57th ACM/EDAC/IEEE Design Automation ConferenceArticle No.: 90, Pages 1–2This paper surveys results in the use of neural networks and deep learning in two areas of hardware security: power attacks and physically-unclonable functions (PUFs).
- research-articleOctober 2018
Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityPages 146–162https://doi.org/10.1145/3243734.3243744Maliciously-injected power load, a.k.a. power attack, has recently surfaced as a new egregious attack vector for dangerously compromising the data center availability. This paper focuses on the emerging threat of power attacks in a multi-tenant ...
- extended-abstractJune 2018
Why Some Like It Loud: Timing Power Attacks in Multi-tenant Data Centers Using an Acoustic Side Channel
SIGMETRICS '18: Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer SystemsPages 70–72https://doi.org/10.1145/3219617.3219645The common practice of power infrastructure oversubscription in data centers exposes dangerous vulnerabilities to well-timed power attacks (i.e., maliciously timed power loads), possibly creating outages and resulting in multimillion-dollar losses. In ...
Also Published in:
ACM SIGMETRICS Performance Evaluation Review: Volume 46 Issue 1 - research-articleApril 2018
Why Some Like It Loud: Timing Power Attacks in Multi-tenant Data Centers Using an Acoustic Side Channel
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 2, Issue 1Article No.: 6, Pages 1–33https://doi.org/10.1145/3179409The common practice of power infrastructure oversubscription in data centers exposes dangerous vulnerabilities to well-timed power attacks (i.e., maliciously timed power loads to overload the infrastructure capacity), possibly creating outages and ...
- research-articleOctober 2017
Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 1079–1094https://doi.org/10.1145/3133956.3133994The power capacity of multi-tenant data centers is typically oversubscribed in order to increase the utilization of expensive power infrastructure. This practice can create dangerous situations and compromise data center availability if the designed ...
- posterJune 2016
Poster: Power Attack in Body Area Networks: Dream or Reality?
MobiSys '16 Companion: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services CompanionPage 66https://doi.org/10.1145/2938559.2948815Entering the era of remote health monitoring and wearable devices, wireless body area networks (BSNs) are growing at a fast pace. However, energy restriction of micro-battery of a bio-sensor makes BANs vulnerable to malicious attacks. In this paper, we ...
- research-articleJune 2016
Power attack defense: securing battery-backed data centers
ISCA '16: Proceedings of the 43rd International Symposium on Computer ArchitecturePages 493–505https://doi.org/10.1109/ISCA.2016.50Battery systems are crucial components for mission-critical data centers. Without secure energy backup, existing under-provisioned data centers are largely unguarded targets for cyber criminals. Particularly for today's scale-out servers, power ...
Also Published in:
ACM SIGARCH Computer Architecture News: Volume 44 Issue 3 - research-articleOctober 2014
Information theoretic models for signatures in VLSI power delivery systems
WESS '14: Proceedings of the 9th Workshop on Embedded Systems SecurityArticle No.: 2, Pages 1–5https://doi.org/10.1145/2668322.2668324We propose several abstract models for power distribution systems (PDSs) and show how the physics of PDNs pose limits on our ability to protect against power attacks. Integrated circuits increasingly use integrated voltage regulators (IVRs) to condition ...
- research-articleMarch 2013
Secure dual-core cryptoprocessor for pairings over Barreto-Naehrig curves on FPGA platform
IEEE Transactions on Very Large Scale Integration (VLSI) Systems (ITVL), Volume 21, Issue 3Pages 434–442https://doi.org/10.1109/TVLSI.2012.2188655This paper is devoted to the design and the physical security of a parallel dual-core flexible cryptoprocessor for computing pairings over Barreto-Naehrig (BN) curves. The proposed design is specifically optimized for field-programmable gate-array (FPGA)...
- ArticleJuly 2011
Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields
ISVLSI '11: Proceedings of the 2011 IEEE Computer Society Annual Symposium on VLSIPages 363–364https://doi.org/10.1109/ISVLSI.2011.39This work deals with the design and implementation of pairing based cryptographic hardware and its security analysis against side-channel and fault attacks.
- ArticleDecember 2007
A near optimal S-box design
ICISS'07: Proceedings of the 3rd international conference on Information systems securityPages 77–90In this work a cryptographically robust S-box based on nonlinear Cellular Automata rules has been developed. Properties suggest that the robustness of the proposed construction is better than that proposed by Seberry et al. [1]. Though the proposed S-...
- ArticleFebruary 2002
A Combined Timing and Power Attack
In [9] Walter and Thompson introduced a new side-channel attack on the secret exponents of modular exponentiations which uses techniques from timing attacks to exploit specific information gained by a power attack. Walter and Thompson assumed that the ...