Book ChapterDOI
An Introduction to Timing Attacks
Chester Rebeiro,Debdeep Mukhopadhyay,Sarani Bhattacharya +2 more
- pp 1-11
TLDR
This chapter introduces side-channel attacks and timing attacks on implementations of cryptographic ciphers, and classifies timing attacks, and presents the essential requirements for the attack to succeed, and discusses the attackers success.Abstract:
This chapter introduces side-channel attacks and timing attacks on implementations of cryptographic ciphers. It classifies timing attacks, presents the essential requirements for the attack to succeed, and discusses the attackers success. The chapter also outlines the contents of the book.read more
Citations
More filters
Journal ArticleDOI
A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks
TL;DR: It is found that the variance of random delays is the primary influencing factor to the mitigation effectiveness of random padding and that the extra number of measurements an attacker has to make grows linearly with the standard deviation of the random delays.
Proceedings ArticleDOI
Security of autonomous vehicle as a cyber-physical system
TL;DR: This paper reviews the security objectives of Autonomous Vehicle and argues that AV is a kind of Cyber-Physical System (CPS) for control and operations of the vehicle and attempts to identify the core issues of securing an AV.
Book ChapterDOI
Model-Based Quantitative Security Analysis of Mobile Offloading Systems Under Timing Attacks
TL;DR: This paper aims at quantifying the security attributes of mobile offloading systems, modeled as a stochastic process for steady-state behaviour as to optimise a combined security and cost trade-off measure.
Book ChapterDOI
Security and Performance Tradeoff Analysis of Mobile Offloading Systems Under Timing Attacks
TL;DR: This paper aims at quantifying the security attributes and their impact on the performance of mobile offloading systems as a hybrid CTMC and queueing model and compute the “mean time to security failure” (MTTSF) measure.
Journal ArticleDOI
A Fault-Tolerant Approach to Alleviate Failures in Offloading Systems
TL;DR: The checkpoint based fault-tolerance approach proposed in this paper is able to handle crash, omission and transient failures altogether and is found to be effective with respect to energy consumption and resource utilization even in case of crash and omission failure.
References
More filters
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book ChapterDOI
Differential Power Analysis
TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
Book ChapterDOI
The EM Side-Channel(s)
TL;DR: It is shown that not only can EM emanations be used to attack cryptographic devices where the power side-channel is unavailable, they can even beused to break power analysis countermeasures.