Leonid Azriel
YOU?
Author Swipe
View article: Improving Resilience, Security, and Safety of Drones Through HTM-Based Adaptive Learning
Improving Resilience, Security, and Safety of Drones Through HTM-Based Adaptive Learning Open
This proposal suggests significantly improving the safety, the security, and the reliability of drones via a novel design technique that combines fault tolerance (FT) design methodology, the use of Hierarchical Operations that employ a dis…
View article: Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2 Open
In this paper, we introduce Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes that use arithmetical addition. We apply this methodology to attacking HMAC-SHA-2. We provide full mathematic…
View article: Redundancy AES Masking Basis for Attack Mitigation (RAMBAM)
Redundancy AES Masking Basis for Attack Mitigation (RAMBAM) Open
In this work, we present RAMBAM, a novel concept of designing countermeasures against side-channel attacks and the Statistical Ineffective Fault Attack (specifically SIFA-1) on AES that employs redundant representations of finite field ele…
View article: DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering Open
Reverse engineering of integrated circuits, i.e., understanding the internals of Integrated Circuits (ICs), is required for many benign and malicious applications. Examples of the former are detection of patent infringements, hardware Troj…
View article: DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering Open
Reverse engineering of integrated circuits, i.e., understanding the internals of Integrated Circuits (ICs), is required for many benign and malicious applications. Examples of the former are detection of patent infringements, hardware Troj…
View article: Memory-Side Protection With a Capability Enforcement Co-Processor
Memory-Side Protection With a Capability Enforcement Co-Processor Open
Byte-addressable nonvolatile memory (NVM) blends the concepts of storage and memory and can radically improve data-centric applications, from in-memory databases to graph processing. By enabling large-capacity devices to be shared across m…