Proceedings of the 44th Annual International Symposium on Computer Architecture 2017
DOI: 10.1145/3079856.3080223
|View full text |Cite
|
Sign up to set email alerts
|

Eddie

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(5 citation statements)
references
References 60 publications
0
5
0
Order By: Relevance
“…EM side-channel attacks. Most works studying electromagnetic (EM) side channels have to use a special EM probe to collect EM signals to reverse engineer a neural network [9], monitor program execution [29], [49] from micro-controllers, extract secret keys [3], [4], [11], [25], recognize the security code from the touchscreen [42], and infer keystrokes [32] from smartphones. Other works use a smartphone as a probe to launch attacks, such as monitoring software launches in laptops [20].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…EM side-channel attacks. Most works studying electromagnetic (EM) side channels have to use a special EM probe to collect EM signals to reverse engineer a neural network [9], monitor program execution [29], [49] from micro-controllers, extract secret keys [3], [4], [11], [25], recognize the security code from the touchscreen [42], and infer keystrokes [32] from smartphones. Other works use a smartphone as a probe to launch attacks, such as monitoring software launches in laptops [20].…”
Section: Related Workmentioning
confidence: 99%
“…Other works use a smartphone as a probe to launch attacks, such as monitoring software launches in laptops [20]. These EM-based attacks are launched in a close proximity, e.g., less than 1cm [3], [4], [9], [11], [25], [29], [42], [49], 2.5-5cm [20], 20-90cm [32]. Different from these works, WISERS leverages a new side channel and uses a COTS smartphone to uncover user interactions on another victim smartphone in a fine-grained and context-aware manner from similar proximity.…”
Section: Related Workmentioning
confidence: 99%
“…In principle, certain characteristics of the emitted analog signals have a strong correlation to the instructions being executed by the CPU. Thus, numerous side-channel-based anomaly detection approaches have been proposed particularly to provide external protection for embedded devices [1], [2], [3], [4], [5].…”
Section: Introductionmentioning
confidence: 99%
“…This is primarily due to the ease of data collection and the robustness of this modality against environmental noise. Nevertheless, when compared to power-based approaches, electromagnetic (EM) based methods are theoretically more advantageous because the EM spectrum offers higher bandwidth, and the EM signals can be sampled at higher rates [3], [6]. Moreover, depending on the type of antenna, the approach can be less invasive as the monitoring can be performed from a distance in real time.…”
Section: Introductionmentioning
confidence: 99%
“…In the past, alternative sidechannels have been considered, including the power consumption patterns [3], [4], [5], the thermal footprint [6] or the acoustic signals [7] of devices during their operation. Nevertheless, EM-based approaches [8], [9], [10], [11], [12] offer a comparative advantage since the signals themselves can be captured and analyzed in a completely non-intrusive fashion, i.e., no installation of software in the monitored device is assumed. Moreover, unlike analog signals describing the analysis of power consumption, the EM spectrum offers high bandwidth.…”
Section: Introductionmentioning
confidence: 99%