scispace - formally typeset
Book ChapterDOI

An Introduction to Timing Attacks

TLDR
This chapter introduces side-channel attacks and timing attacks on implementations of cryptographic ciphers, and classifies timing attacks, and presents the essential requirements for the attack to succeed, and discusses the attackers success.
Abstract
This chapter introduces side-channel attacks and timing attacks on implementations of cryptographic ciphers. It classifies timing attacks, presents the essential requirements for the attack to succeed, and discusses the attackers success. The chapter also outlines the contents of the book.

read more

Citations
More filters
Journal ArticleDOI

A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks

TL;DR: It is found that the variance of random delays is the primary influencing factor to the mitigation effectiveness of random padding and that the extra number of measurements an attacker has to make grows linearly with the standard deviation of the random delays.
Proceedings ArticleDOI

Security of autonomous vehicle as a cyber-physical system

TL;DR: This paper reviews the security objectives of Autonomous Vehicle and argues that AV is a kind of Cyber-Physical System (CPS) for control and operations of the vehicle and attempts to identify the core issues of securing an AV.
Book ChapterDOI

Model-Based Quantitative Security Analysis of Mobile Offloading Systems Under Timing Attacks

TL;DR: This paper aims at quantifying the security attributes of mobile offloading systems, modeled as a stochastic process for steady-state behaviour as to optimise a combined security and cost trade-off measure.
Book ChapterDOI

Security and Performance Tradeoff Analysis of Mobile Offloading Systems Under Timing Attacks

TL;DR: This paper aims at quantifying the security attributes and their impact on the performance of mobile offloading systems as a hybrid CTMC and queueing model and compute the “mean time to security failure” (MTTSF) measure.
Journal ArticleDOI

A Fault-Tolerant Approach to Alleviate Failures in Offloading Systems

TL;DR: The checkpoint based fault-tolerance approach proposed in this paper is able to handle crash, omission and transient failures altogether and is found to be effective with respect to energy consumption and resource utilization even in case of crash and omission failure.
References
More filters
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

TL;DR: By carefully measuring the amount of time required to perform private key operalions, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems.
Book ChapterDOI

The EM Side-Channel(s)

TL;DR: It is shown that not only can EM emanations be used to attack cryptographic devices where the power side-channel is unavailable, they can even beused to break power analysis countermeasures.