2018
DOI: 10.1007/978-3-319-78556-1_9
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The proposed technique attempts to solve the problem by utilizing the power trace of microcontrollers during the cryptography function to ensure the ASIC-resistant PoW. The main idea is based on the PoW of Bitcoin and the source code classification by analyzing power traces [35,36].…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed technique attempts to solve the problem by utilizing the power trace of microcontrollers during the cryptography function to ensure the ASIC-resistant PoW. The main idea is based on the PoW of Bitcoin and the source code classification by analyzing power traces [35,36].…”
Section: Proposed Methodsmentioning
confidence: 99%
“…The known power consumption and the dependencies of the codes executed can be used as techniques for determining the similarity of the codes [35]. In [36], IP protection through similar power trace is suggested. According to previous works, the power trace can be utilized for the identification of target program.…”
Section: Power Analysis and Its New Applicationsmentioning
confidence: 99%