Sign in

Exploiting small leakages in masks to turn a second-order attack into a first-order attack.

Alexander DeTranoSylvain GuilleyXiaofei GuoNaghmeh KarimiRamesh Karri
Published in: HASP@ISCA (2015)
Keyphrases
  • higher order
  • countermeasures
  • attack detection
  • genetic algorithm
  • denial of service attacks
  • real time
  • neural network
  • malicious users
  • data corruption