User menu

Side-Channel Attacks Against the Human Brain: the PIN Code Case Study

Bibliographic reference Lange, Joseph ; Massart, Clément ; Mouraux, André ; Standaert, François-Xavier. Side-Channel Attacks Against the Human Brain: the PIN Code Case Study.8th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2017) (Paris (France), du 13/04/2017 au 14/04/2017). In: Lecture Notes in Computer Science, Vol. 10348, p. 171-189 (2017)
Permanent URL
  1. . Accessed July 2016
  2. . Accessed July 2016
  3. . Accessed July 2016
  4. Archambeau C., Peeters E., Standaert F. -X., Quisquater J. -J., Template Attacks in Principal Subspaces, Lecture Notes in Computer Science (2006) ISBN:9783540465591 p.1-14, 10.1007/11894063_1
  5. Batina Lejla, Gierlichs Benedikt, Prouff Emmanuel, Rivain Matthieu, Standaert François-Xavier, Veyrat-Charvillon Nicolas, Mutual Information Analysis: a Comprehensive Study, 10.1007/s00145-010-9084-8
  6. Berlad I., Pratt H., P300 in response to the subject's own name, 10.1016/0168-5597(95)00116-a
  7. Bonaci Tamara, Calo Ryan, Chizeck Howard Jay, App Stores for the Brain : Privacy and Security in Brain-Computer Interfaces, 10.1109/mts.2015.2425551
  8. Chari Suresh, Rao Josyula R., Rohatgi Pankaj, Template Attacks, Cryptographic Hardware and Embedded Systems - CHES 2002 (2003) ISBN:9783540004097 p.13-28, 10.1007/3-540-36400-5_3
  9. Coyle Damien, Principe Jose, Lotte Fabien, Nijholt Anton, Guest Editorial: Brain/neuronal - Computer game interfaces and interaction, 10.1109/tciaig.2013.2264736
  10. Duc Alexandre, Faust Sebastian, Standaert François-Xavier, Making Masking Security Proofs Concrete, Advances in Cryptology -- EUROCRYPT 2015 (2015) ISBN:9783662467992 p.401-429, 10.1007/978-3-662-46800-5_16
  11. Durvaux François, Standaert François-Xavier, Veyrat-Charvillon Nicolas, How to Certify the Leakage of a Chip?, Advances in Cryptology – EUROCRYPT 2014 (2014) ISBN:9783642552199 p.459-476, 10.1007/978-3-642-55220-5_26
  12. Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. CRC Press, Boca Raton (1994)
  13. Engel Jerome, Kuhl David E., Phelps Michael E., Crandall Paul H., Comparative localization of foci in partial epilepsy by PCT and EEG, 10.1002/ana.410120605
  14. Farwell Lawrence A., Donchin Emanuel, The Truth Will Out: Interrogative Polygraphy ("Lie Detection") With Event-Related Brain Potentials, 10.1111/j.1469-8986.1991.tb01990.x
  15. Ienca Marcello, Haselager Pim, Hacking the brain: brain–computer interfacing technology and the ethics of neurosecurity, 10.1007/s10676-016-9398-9
  16. Inzlicht Michael, McGregor Ian, Hirsh Jacob B., Nash Kyle, Neural Markers of Religious Conviction, 10.1111/j.1467-9280.2009.02305.x
  17. Kutas M, Hillyard S., Reading senseless sentences: brain potentials reflect semantic incongruity, 10.1126/science.7350657
  18. Kutas Marta, Hillyard Steven A., Brain potentials during reading reflect word expectancy and semantic association, 10.1038/307161a0
  19. Lin, C., Wu, R., Liang, S., Chao, W., Chen, Y., Jung, T.: EEG-based drowsiness estimation for safety driving using independent component analysis. IEEE Trans. Circ. Syst. 52–I(12), 2726–2738 (2005)
  20. Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, New York (2007)
  21. Martinovic, I., Davies, D., Frank, M., Perito, D., Ros, T., Song, D.: On the feasibility of side-channel attacks with brain-computer interfaces. In: USENIX Security Symposium, Proceedings, pp. 143–158. USENIX Association (2012)
  22. Portas Chiara M., Krakow Karsten, Allen Phillip, Josephs Oliver, Armony Jorge L., Frith Chris D., Auditory Processing across the Sleep-Wake Cycle, 10.1016/s0896-6273(00)00169-0
  23. Renauld Mathieu, Standaert François-Xavier, Veyrat-Charvillon Nicolas, Kamel Dina, Flandre Denis, A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices, Advances in Cryptology – EUROCRYPT 2011 (2011) ISBN:9783642204647 p.109-128, 10.1007/978-3-642-20465-4_8
  24. Silverman B. W., Density Estimation for Statistics and Data Analysis, ISBN:9780412246203, 10.1007/978-1-4899-3324-9
  25. Smart, N.P.: Computing on encrypted data. In: Kayaks & Dreadnoughts in a Sea of Crypto, September 2016
  26. Standaert François-Xavier, Koeune François, Schindler Werner, How to Compare Profiled Side-Channel Attacks?, Applied Cryptography and Network Security (2009) ISBN:9783642019562 p.485-498, 10.1007/978-3-642-01957-9_30
  27. Standaert François-Xavier, Malkin Tal G., Yung Moti, A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks, Advances in Cryptology - EUROCRYPT 2009 (2009) ISBN:9783642010002 p.443-461, 10.1007/978-3-642-01001-9_26
  28. Veyrat-Charvillon Nicolas, Gérard Benoît, Renauld Mathieu, Standaert François-Xavier, An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks, Selected Areas in Cryptography (2013) ISBN:9783642359989 p.390-406, 10.1007/978-3-642-35999-6_25