Login / Signup
Exploiting small leakages in masks to turn a second-order attack into a first-order attack.
Alexander DeTrano
Sylvain Guilley
Xiaofei Guo
Naghmeh Karimi
Ramesh Karri
Published in:
HASP@ISCA (2015)
Keyphrases
</>
higher order
countermeasures
attack detection
genetic algorithm
denial of service attacks
real time
neural network
malicious users
data corruption