共 50 条
- [2] Automated Black-Box Detection of Side-Channel Vulnerabilities in Web Applications [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 263 - 274
- [3] Automated Side-Channel Attacks using Black-Box Neural Architecture Search [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
- [4] When Side-Channel Attacks Break the Black-Box Property of Embedded Artificial Intelligence [J]. PROCEEDINGS OF THE 16TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2023, 2023, : 127 - 138
- [5] Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 24 - 53
- [6] Evaluating and Designing against Side-Channel Leakage: White Box or Black Box? [J]. PROCEEDINGS OF THE 2021 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH&MMSEC 2021, 2021, : 1 - 1
- [7] Predictive Black-Box Mitigation of Timing Channels [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 297 - 307
- [8] μLeech: A Side-Channel Evaluation Platform for IoT [J]. 2017 IEEE 60TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2017, : 25 - 28
- [9] How to fool a black box machine learning based side-channel security evaluation [J]. Cryptography and Communications, 2021, 13 : 573 - 585
- [10] How to fool a black box machine learning based side-channel security evaluation [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (04): : 573 - 585