ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1903.07703
  4. Cited By
A Survey of Electromagnetic Side-Channel Attacks and Discussion on their
  Case-Progressing Potential for Digital Forensics

A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics

18 March 2019
Asanka P. Sayakkara
Nhien-An Le-Khac
Mark Scanlon
ArXivPDFHTML

Papers citing "A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics"

19 / 19 papers shown
Title
SHIFT SNARE: Uncovering Secret Keys in FALCON via Single-Trace Analysis
SHIFT SNARE: Uncovering Secret Keys in FALCON via Single-Trace Analysis
Jinyi Qiu
Aydin Aysu
54
2
0
01 Apr 2025
Electromagnetic Side-Channel Analysis of PRESENT Lightweight Cipher
Electromagnetic Side-Channel Analysis of PRESENT Lightweight Cipher
N. Gunathilake
O. Lo
William J. Buchanan
A. Al-Dubai
56
0
0
15 Mar 2025
Analyzing and Exploiting Branch Mispredictions in Microcode
Analyzing and Exploiting Branch Mispredictions in Microcode
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
39
0
0
22 Jan 2025
Label-free SERS Discrimination of Proline from Hydroxylated Proline at
  Single-molecule Level Assisted by a Deep Learning Model
Label-free SERS Discrimination of Proline from Hydroxylated Proline at Single-molecule Level Assisted by a Deep Learning Model
Yingqi Zhao
Kuo Zhan
Pei-Lin Xin
Zuyan Chen
Shuai Li
Francesco De Angelis
Jianan Huang
22
0
0
25 Dec 2024
Cybersecurity in the Quantum Era: Assessing the Impact of Quantum
  Computing on Infrastructure
Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure
Yaser Baseri
Vikas Chouhan
Ali Ghorbani
34
13
0
16 Apr 2024
Systematic Literature Review of EM-SCA Attacks on Encryption
Systematic Literature Review of EM-SCA Attacks on Encryption
Muhammad Rusyaidi Zunaidi
Asanka P. Sayakkara
Mark Scanlon
34
2
0
15 Feb 2024
Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey
  on PQ Standardization, Applications, Challenges and Opportunities
Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities
Saleh Darzi
Kasra Ahmadi
Saeed Aghapour
Attila Altay Yavuz
Mehran Mozaffari Kermani
16
7
0
18 Oct 2023
Crossed-IoT device portability of Electromagnetic Side Channel Analysis:
  Challenges and Dataset
Crossed-IoT device portability of Electromagnetic Side Channel Analysis: Challenges and Dataset
T. Yasarathna
Lojenaa Navanesan
Simon Barque
Assanka Sayakkara
Nhien-An Le-Khac
33
2
0
04 Oct 2023
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Serberus: Protecting Cryptographic Code from Spectres at Compile-Time
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
25
9
0
11 Sep 2023
Electromagnetic Side-Channel Attack Resilience against PRESENT
  Lightweight Block Cipher
Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher
N. Gunathilake
A. Al-Dubai
William J. Buchanan
O. Lo
11
7
0
22 Dec 2021
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer
  Authentication
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication
Sungbae Yoo
Jinbum Park
Seolheui Kim
Yeji Kim
Taesoo Kim
LLMSV
24
33
0
14 Dec 2021
Research trends, challenges, and emerging topics of digital forensics: A
  review of reviews
Research trends, challenges, and emerging topics of digital forensics: A review of reviews
Fran Casino
Thomas K. Dasaklis
G. Spathoulas
M. Anagnostopoulos
Amrita Ghosal
István Bor̈oc̈z
A. Solanas
Mauro Conti
Constantinos Patsakis
21
81
0
10 Aug 2021
Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT
Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT
N. Gunathilake
A. Al-Dubai
William J. Buchanan
O. Lo
11
3
0
29 Jun 2021
Recovering AES Keys with a Deep Cold Boot Attack
Recovering AES Keys with a Deep Cold Boot Attack
Itamar Zimerman
Eliya Nachmani
Lior Wolf
11
3
0
09 Jun 2021
Survey and Taxonomy of Adversarial Reconnaissance Techniques
Survey and Taxonomy of Adversarial Reconnaissance Techniques
Shanto Roy
N. Sharmin
Jamie C. Acosta
Christopher Kiekintveld
Aron Laszka
11
42
0
11 May 2021
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A
  Comprehensive Analysis
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis
Carlton Shepherd
K. Markantonakis
Nico van Heijningen
D. Aboulkassimi
Clément Gaine
Thibaut Heckmann
D. Naccache
14
43
0
10 May 2021
Smarter Password Guessing Techniques Leveraging Contextual Information
  and OSINT
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT
Aikaterini Kanta
Iwen Coisel
Mark Scanlon
22
8
0
02 Dec 2020
A Compiler Assisted Scheduler for Detecting and Mitigating Cache-Based
  Side Channel Attacks
A Compiler Assisted Scheduler for Detecting and Mitigating Cache-Based Side Channel Attacks
Sharjeel Khan
Girish Mururu
S. Pande
19
6
0
08 Mar 2020
Leveraging Electromagnetic Side-Channel Analysis for the Investigation
  of IoT Devices
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices
Asanka P. Sayakkara
Nhien-An Le-Khac
Mark Scanlon
36
56
0
03 Apr 2019
1