Automatic Detection and Decryption of AES by Monitoring S-Box Access

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICISSP ICISSP 2021
1. Verfasser: Kokeš, Josef (VerfasserIn)
Weitere Verfasser: Matějka, Jonatan (VerfasserIn), Lórencz, Róbert (VerfasserIn)
Pages:2021
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
An Analytic Attack against ARX Addition Exploiting Standard Side-channel Leakage 2021 Yan, Yan
Checking Contact Tracing App Implementations 2021 Flood, Robert
Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection Datasets 2021 Pacheco, Yulexis
Mobile Robots: An Overview of Data and Security 2021 Kadena, Esmeralda
Enhanced Information Management in Inter-organisational Planning for Critical Infrastructure Protection: Case and Framework 2021 Große, Christine
Active Directory Kerberoasting Attack: Detection using Machine Learning Techniques 2021 Kotlaba, Lukáš
Ontology-based cybersecurity and resilience framework 2021 Hutschenreuter, Helmar
Windows Malware Binaries in C/C++ GitHub Repositories: Prevalence and Lessons Learned 2021 Cholter, William La
Enabling Monetization of Depreciating Data on Blockchains 2021 Dahdah, Christian
Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing 2021 Jacob, Stephen
A Dynamic Access Control System based on Situations of Users 2021 Hasegawa, Hirokazu
Securing Orchestrated Containers with BSI Module SYS.1.6 2021 Haar, Christoph
Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption 2021 Boudguiga, Aymen
Malware Classification using Long Short-term Memory Models 2021 Dang, Dennis
Colluding Covert Channel for Malicious Information Exfiltration in Android Environment 2021 Casolare, Rosangela
Practical and Provably Sound Static Analysis of Ethereum Smart Contracts 2021 Maffei, Matteo
Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based Applications 2021 Brunner, Clemens
On Security Analysis of Periodic Systems: Expressiveness and Complexity 2021 Alturki, Musab A.
Bridging Knowledge Gaps in Security Analytics 2021 Böhm, Fabian
Parallel Privacy-preserving Computation of Minimum Spanning Trees 2021 Anagreh, Mohammad
Alle Artikel auflisten