2017
DOI: 10.1109/tmscs.2016.2643638
|View full text |Cite
|
Sign up to set email alerts
|

New Methods of Template Attack Based on Fault Sensitivity Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…The information of these leaks has a certain relationship with the data at runtime. The adversary can effectively recover the key by analysing the information [1–3].…”
Section: Introductionmentioning
confidence: 99%
“…The information of these leaks has a certain relationship with the data at runtime. The adversary can effectively recover the key by analysing the information [1–3].…”
Section: Introductionmentioning
confidence: 99%
“…However in the scene of edge computing, the adversary can usually hold or touch the edge servers and IoT devices. So, he can conduct some physical attacks on the edge servers and IoT devices, such as power attack [4], fault injection [5], [6], cache attack [7], etc.…”
Section: Introductionmentioning
confidence: 99%
“…The statistical algorithm of template matching, which is widely used in pattern recognition of image processing, could solve this problem effectively [26], [27]. Template matching method could be employed for fault sensitivity analysis [28]. Several representation methods of equipment fault feature based on template matching has also been proposed [29], [30].…”
Section: Introductionmentioning
confidence: 99%