2015 11th International Conference on Computational Intelligence and Security (CIS) 2015
DOI: 10.1109/cis.2015.103
|View full text |Cite
|
Sign up to set email alerts
|

A Combination of Timing Attack and Statistical Method to Reduce Computational Complexities of SSL/TLS Side-Channel Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Alwarafy et al [114] Simulation technique by inserting fake packets. Wang et al [115] Cipher block chaining encryption. Park et al [116] CAD tool framework.…”
Section: Table IX Defenses Against Side-channel Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Alwarafy et al [114] Simulation technique by inserting fake packets. Wang et al [115] Cipher block chaining encryption. Park et al [116] CAD tool framework.…”
Section: Table IX Defenses Against Side-channel Attackmentioning
confidence: 99%
“…Wang et al [115] studied the cryptographic operation of SSL/TLS Record Protocol in cipher block chaining (CBC)mode encryption. Park et al [116] proposed a CAD tool framework for automatic timing attack vulnerability evaluation associated algorithms and metrics at the early design stage.…”
Section: Table IX Defenses Against Side-channel Attackmentioning
confidence: 99%
“…Lavaud et al [177] survey the class of side-channel attacks that include both non-electromagnetic or electromagnetic and their countermeasures. Wang et al [172] study the cryptographic operation of SSL/TLS Record Protocol in cipher block chaining (CBC)mode encryption. Park et al [173] propose a CAD tool framework for automatic timing attack vulnerability evaluation and associated algorithms and metrics at the early design stage.…”
Section: ) Defenses Against Side-channel Attackmentioning
confidence: 99%
“…Indeed, an alternative protocol should be considered. As the time of writing this paper, TLS is the better alternative [25]. IoT in low power consumption sensor environments does not use TCP/IP, but rather User Datagram Protocol (UDP) [33].…”
Section: Introductionmentioning
confidence: 99%