2021 22nd International Symposium on Quality Electronic Design (ISQED) 2021
DOI: 10.1109/isqed51717.2021.9424262
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Delay-based Authentication Scheme for DMA Attack Mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…The same year, the Intel Advanced Threat Research team performed a DMA attack over the air by modifying a WiGig dock to compromise a laptop that is connected to the dock wirelessly [20]. The architecture of wireless connection allows the attacker to use the DMA capabilities to dump secrets out of the memory on the victim machine remotely.…”
Section: Dma Attackmentioning
confidence: 99%
See 3 more Smart Citations
“…The same year, the Intel Advanced Threat Research team performed a DMA attack over the air by modifying a WiGig dock to compromise a laptop that is connected to the dock wirelessly [20]. The architecture of wireless connection allows the attacker to use the DMA capabilities to dump secrets out of the memory on the victim machine remotely.…”
Section: Dma Attackmentioning
confidence: 99%
“…The ROI is used to find the region in the sub-dataset with the lowest noise. In the raw measurements of the data collected from the device, the variance is high, so the proposed scheme [20] calculates the most reliable ROI in the sub-dataset. One of the algorithms is a difference-based algorithm and the other is a correlation-based algorithm.…”
Section: Region Of Interest (Roi) Selectionmentioning
confidence: 99%
See 2 more Smart Citations