Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting
A common assumption in side-channel analysis is that the attacker knows the cryptographic algorithm implementation of the victim. However, many labsetting studies implicitly extend this assumption to the knowledge of the source code, by inserting triggers to measure, locate or align the Cryptograph...
Saved in:
| Main Authors: | Shipei Qu, Yuxuan Wang, Jintong Yu, Chi Zhang, Dawu Gu |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Ruhr-Universität Bochum
2024-12-01
|
| Series: | Transactions on Cryptographic Hardware and Embedded Systems |
| Subjects: | |
| Online Access: | https://tosc.iacr.org/index.php/TCHES/article/view/11925 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
by: Purushottam Singh, et al.
Published: (2025-01-01) -
Transformer-Based Vulnerability Detection in IoT Firmware Binaries Using Opcode Sequences
by: M. Nandish, et al.
Published: (2025-01-01) -
Research on key functions locating technique based on software execution trace difference comparison
by: Fei KANG, et al.
Published: (2013-09-01) -
Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem
by: P. V. Razumov, et al.
Published: (2019-06-01) -
The efficiency of crypt algorithms parallelization
by: A. S. Poljakov, et al.
Published: (2019-06-01)