{"title":"“统一侧信道攻击模型”(USCA-M):生物识别侧信道类型的扩展","authors":"Andrew Johnson, Richard O. Ward","doi":"10.1109/ISDFS55398.2022.9800753","DOIUrl":null,"url":null,"abstract":"This paper presents the ‘Unified Side-Channel Attack Model’ (USCA-M) with an additional side-channel type of ‘Biometrics.’ The original published paper ‘Introducing the Unified Side-Channel Attack–Model (USCA-M)’ [1] was presented and published through the International Symposium on Digital Forensics and Security (ISDFS) conference in 2020 [1]. The USCA-M model was initially compiled by research on side-channel attacks (SCAs) from published journal articles and conference papers between 2015 and 2020. The study found that SCAs can be categorized into three main areas: SCA types, SCA methods, and SCA techniques. The USCA-M provides a unified model to categorize present and future SCA vulnerabilities and exploit techniques found. Its future use would provide a reference point for organizations to identify and place a found SCA within a standard or unified categorization. It can also be used to granulate SCA techniques into identifiable components to assist in defending SCAs, such as code pattern recognition and intrusion detection systems (IDS).","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"‘Unified Side-Channel Attack - Model’ (USCA-M): An Extension with Biometrics Side-Channel Type\",\"authors\":\"Andrew Johnson, Richard O. Ward\",\"doi\":\"10.1109/ISDFS55398.2022.9800753\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents the ‘Unified Side-Channel Attack Model’ (USCA-M) with an additional side-channel type of ‘Biometrics.’ The original published paper ‘Introducing the Unified Side-Channel Attack–Model (USCA-M)’ [1] was presented and published through the International Symposium on Digital Forensics and Security (ISDFS) conference in 2020 [1]. The USCA-M model was initially compiled by research on side-channel attacks (SCAs) from published journal articles and conference papers between 2015 and 2020. The study found that SCAs can be categorized into three main areas: SCA types, SCA methods, and SCA techniques. The USCA-M provides a unified model to categorize present and future SCA vulnerabilities and exploit techniques found. Its future use would provide a reference point for organizations to identify and place a found SCA within a standard or unified categorization. It can also be used to granulate SCA techniques into identifiable components to assist in defending SCAs, such as code pattern recognition and intrusion detection systems (IDS).\",\"PeriodicalId\":114335,\"journal\":{\"name\":\"2022 10th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 10th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS55398.2022.9800753\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS55398.2022.9800753","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
‘Unified Side-Channel Attack - Model’ (USCA-M): An Extension with Biometrics Side-Channel Type
This paper presents the ‘Unified Side-Channel Attack Model’ (USCA-M) with an additional side-channel type of ‘Biometrics.’ The original published paper ‘Introducing the Unified Side-Channel Attack–Model (USCA-M)’ [1] was presented and published through the International Symposium on Digital Forensics and Security (ISDFS) conference in 2020 [1]. The USCA-M model was initially compiled by research on side-channel attacks (SCAs) from published journal articles and conference papers between 2015 and 2020. The study found that SCAs can be categorized into three main areas: SCA types, SCA methods, and SCA techniques. The USCA-M provides a unified model to categorize present and future SCA vulnerabilities and exploit techniques found. Its future use would provide a reference point for organizations to identify and place a found SCA within a standard or unified categorization. It can also be used to granulate SCA techniques into identifiable components to assist in defending SCAs, such as code pattern recognition and intrusion detection systems (IDS).