2022
DOI: 10.1109/tcad.2021.3070243
|View full text |Cite
|
Sign up to set email alerts
|

Imitating Functional Operations for Mitigating Side-Channel Leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…With respect to related works [57][58][59][60][61][62][63], our classification method does not require any disassembly or execution of the actual malware code. Moreover, the image textures used for classification provide more resilient features in terms of obfuscation techniques, and in particular for encryption.…”
Section: Literature Review and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…With respect to related works [57][58][59][60][61][62][63], our classification method does not require any disassembly or execution of the actual malware code. Moreover, the image textures used for classification provide more resilient features in terms of obfuscation techniques, and in particular for encryption.…”
Section: Literature Review and Motivationmentioning
confidence: 99%
“…The hardware security discipline in recent years experienced a plethora of threats like the Malware attacks [1][2][3][4][5][6][7], Side-Channel Attacks [8][9][10][11], Hardware Trojan attacks [12], reverse engineering threats [13][14][15][16][17][18][19][20][21][22][23][24][25][26] and so on. I focus on the malware detection technique here along with some state-of-the-art works.…”
Section: Introduction To Malware Threatsmentioning
confidence: 99%
“…As described in the previous sections, I have been working and publishing papers on Malware Detection [6], Side-Channels Analysis [20,21], Hardware-based Trojan Attack and Detection [10], and Survey-based papers [43,44] published to conferences and journals. I intend to dive deeper into more of SCA based attacks and defenses in future and contribute my work to top tier conferences and journals.…”
Section: Research Progressmentioning
confidence: 99%
“…Snooping on co-located programs' cache trace is performed by cache-based SCAs and is prominently explored in the domain of SCAs. A part of my thesis work focuses on timing-based cache attacks, which exploit the time required to flush/reload an instruction from the cache subsystem as a covert channel [20,21]. Some of the popular cache targeted SCAs are the Flush+Reload [1] and Flush+Flush attack [2].…”
Section: Introductionmentioning
confidence: 99%
“…The hardware security discipline in recent years experienced a plethora of threats like the Malware attacks [1,2,3,4,5,6,7], Side-Channel Attacks [8,9,10,11], Hardware Trojan attacks [12], reverse engineering threats [13,14,15] and so on. We focus on the malware detection technique here along with some state-of-the-art works.…”
Section: Introductionmentioning
confidence: 99%