All Stories

  1. Beyond Power Side Channels: Impedance as a Cryptographic Threat
  2. DExiM: Exposing Impedance-Based Data Leakage in Emerging Memories
  3. How chips can unintentionally reveal the software they are running.
  4. Exploring the Correlation Between DRAM Latencies and Rowhammer Attacks
  5. Disassembling Software Instruction Types through Impedance Side-channel Analysis
  6. Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities
  7. Nearfield RF Sensing for Feature-Detection and Algorithmic Classification of Tamper Attacks
  8. Improvement of Packet Delay and Energy Consumption in Data Aggregation Based M2M Communication System
  9. Delay and Energy Consumption Analysis for M2M Communication with Data Aggregation