Skip to main content

Showing 1–3 of 3 results for author: Shelton, M

.
  1. arXiv:2306.11280  [pdf

    astro-ph.IM astro-ph.SR physics.space-ph

    Infrastructure Strategy to Enable Optical Communications for Next-Generation Heliophysics Missions

    Authors: Marta Shelton, Hongbo Li, Daniel Motto, Antti Pulkkinen, Errol Summerlin, Doug Rabin, Ryan Rogalin, Abraham Douglas, Stephen Lichten, Mark Storm, Brian Mathason, Amir Caspi

    Abstract: To expand frontiers and achieve measurable progress, instruments such as hyperspectral imagers are increased in resolution, field of view, and spectral resolution and range, leading to dramatically higher data volumes. Increasingly, data need to be returned from greater distances, ranging from the Sun-earth L1/ L2 points at 1.5 million km, to L4/L5 halo orbits at 1 AU, to several AU in the case of… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Comments: White paper submitted to the Decadal Survey for Solar and Space Physics (Heliophysics) 2024-2033; 7 pages, 1 table

    Journal ref: Bulletin of the AAS, Vol. 55, Issue 3, Whitepaper #362 (7pp); 2023 July 31

  2. Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code

    Authors: Madura A. Shelton, Ɓukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom

    Abstract: Side-channel attacks are a major threat to the security of cryptographic implementations, particularly for small devices that are under the physical control of the adversary. While several strategies for protecting against side-channel attacks exist, these often fail in practice due to unintended interactions between values deep within the CPU. To detect and protect from side-channel attacks, seve… ▽ More

    Submitted 24 September, 2021; originally announced September 2021.

  3. Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers

    Authors: Madura A Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom

    Abstract: Since their introduction over two decades ago, side-channel attacks have presented a serious security threat. While many ciphers' implementations employ masking techniques to protect against such attacks, they often leak secret information due to unintended interactions in the hardware. We present Rosita, a code rewrite engine that uses a leakage emulator which we amend to correctly emulate the mi… ▽ More

    Submitted 19 November, 2020; v1 submitted 11 December, 2019; originally announced December 2019.

    Comments: 17 pages, 16 figures. Accepted in Network and Distributed Systems Security (NDSS) Symposium 2021