Security and Physical Attacks
.- Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption.- Co-location detection on the Cloud.- Simple Photonic Emission Attack with Reduced Data Complexity.-
Side-Channel Analysis (case studies)
.- Power Analysis Attacks against IEEE 802.15.4 Node.- Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series.- Dismantling real-world ECC with Horizontal and Vertical Template Attacks.- Fault Analysis.- Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT.- Improved Differential Fault Analysis on Camellia-128.- A Note on the Security of CHES 2014 Symmetric Infective Countermeasure.-
Side-Channel Analysis (tools)
.- Simpler, Faster, and More Robust T-test Based Leakage Detection.- Design and implementation of a waveform-matching based triggering system.- Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order.