Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Research on Fault Probability Based on Hamming Weight in Fault Injection Attack

    Tong Wu*, Dawei Zhou

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3067-3094, 2025, DOI:10.32604/cmc.2025.066525 - 23 September 2025

    Abstract Fault attacks have emerged as an increasingly effective approach for integrated circuit security attacks due to their short execution time and minimal data requirement. However, the lack of a unified leakage model remains a critical challenge, as existing methods often rely on algorithm-specific details or prior knowledge of plaintexts and intermediate values. This paper proposes the Fault Probability Model based on Hamming Weight (FPHW) to address this. This novel statistical framework quantifies fault attacks by solely analyzing the statistical response of the target device, eliminating the need for attack algorithm details or implementation specifics. Building… More >

  • Open Access

    ARTICLE

    A Novel Stacked Network Method for Enhancing the Performance of Side-Channel Attacks

    Zhicheng Yin1,2, Lang Li1,2,*, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1001-1022, 2025, DOI:10.32604/cmc.2025.060925 - 26 March 2025

    Abstract The adoption of deep learning-based side-channel analysis (DL-SCA) is crucial for leak detection in secure products. Many previous studies have applied this method to break targets protected with countermeasures. Despite the increasing number of studies, the problem of model overfitting. Recent research mainly focuses on exploring hyperparameters and network architectures, while offering limited insights into the effects of external factors on side-channel attacks, such as the number and type of models. This paper proposes a Side-channel Analysis method based on a Stacking ensemble, called Stacking-SCA. In our method, multiple models are deeply integrated. Through the… More >

  • Open Access

    ARTICLE

    Detection Technique of Software-Induced Rowhammer Attacks

    Minkyung Lee1, Jin Kwak2,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 349-367, 2021, DOI:10.32604/cmc.2021.014700 - 12 January 2021

    Abstract Side-channel attacks have recently progressed into software-induced attacks. In particular, a rowhammer attack, which exploits the characteristics of dynamic random access memory (DRAM), can quickly and continuously access the cells as the cell density of DRAM increases, thereby generating a disturbance error affecting the neighboring cells, resulting in bit flips. Although a rowhammer attack is a highly sophisticated attack in which disturbance errors are deliberately generated into data bits, it has been reported that it can be exploited on various platforms such as mobile devices, web browsers, and virtual machines. Furthermore, there have been studies… More >

Displaying 1-10 on page 1 of 3. Per Page