Domenic Forte, Ben Amaba, Cate Richards, Jeff Daniels
{"title":"无处藏身:监控侧渠道,提高供应链应变能力","authors":"Domenic Forte, Ben Amaba, Cate Richards, Jeff Daniels","doi":"10.1109/MRL.2024.3388408","DOIUrl":null,"url":null,"abstract":"Side channels are nonfunctional characteristics of a program or hardware (HW), such as power consumption, electromagnetic radiation (EM), temperature, timing, or memory consumption, that allow one to infer information about the program, software (SW), or HW. Often, attackers take advantage of these side channels to uncover secrets from cryptographic systems, web applications, and more. However, in the right hands, side-channel analysis can also be used for anomaly detection where it has several advantages over traditional solutions.","PeriodicalId":517825,"journal":{"name":"IEEE Reliability Magazine","volume":"41 1","pages":"27-34"},"PeriodicalIF":0.0000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Nowhere to Hide: Monitoring Side Channels for Supply Chain Resiliency\",\"authors\":\"Domenic Forte, Ben Amaba, Cate Richards, Jeff Daniels\",\"doi\":\"10.1109/MRL.2024.3388408\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Side channels are nonfunctional characteristics of a program or hardware (HW), such as power consumption, electromagnetic radiation (EM), temperature, timing, or memory consumption, that allow one to infer information about the program, software (SW), or HW. Often, attackers take advantage of these side channels to uncover secrets from cryptographic systems, web applications, and more. However, in the right hands, side-channel analysis can also be used for anomaly detection where it has several advantages over traditional solutions.\",\"PeriodicalId\":517825,\"journal\":{\"name\":\"IEEE Reliability Magazine\",\"volume\":\"41 1\",\"pages\":\"27-34\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Reliability Magazine\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MRL.2024.3388408\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Reliability Magazine","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MRL.2024.3388408","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Nowhere to Hide: Monitoring Side Channels for Supply Chain Resiliency
Side channels are nonfunctional characteristics of a program or hardware (HW), such as power consumption, electromagnetic radiation (EM), temperature, timing, or memory consumption, that allow one to infer information about the program, software (SW), or HW. Often, attackers take advantage of these side channels to uncover secrets from cryptographic systems, web applications, and more. However, in the right hands, side-channel analysis can also be used for anomaly detection where it has several advantages over traditional solutions.