Skip to main content

Showing 1–4 of 4 results for author: Rahaeimehr, R

.
  1. arXiv:2505.04896  [pdf, ps, other

    cs.CR

    Memory Under Siege: A Comprehensive Survey of Side-Channel Attacks on Memory

    Authors: MD Mahady Hassan, Shanto Roy, Reza Rahaeimehr

    Abstract: Side-channel attacks on memory (SCAM) exploit unintended data leaks from memory subsystems to infer sensitive information, posing significant threats to system security. These attacks exploit vulnerabilities in memory access patterns, cache behaviors, and other microarchitectural features to bypass traditional security measures. The purpose of this research is to examine SCAM, classify various att… ▽ More

    Submitted 7 May, 2025; originally announced May 2025.

  2. arXiv:2403.08740  [pdf, other

    cs.CR

    Acoustic Side Channel Attack on Keyboards Based on Typing Patterns

    Authors: Alireza Taheritajar, Reza Rahaeimehr

    Abstract: Acoustic side-channel attacks on keyboards can bypass security measures in many systems that use keyboards as one of the input devices. These attacks aim to reveal users' sensitive information by targeting the sounds made by their keyboards as they type. Most existing approaches in this field ignore the negative impacts of typing patterns and environmental noise in their results. This paper seeks… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: 8 pages, 6 figures

  3. arXiv:2312.08086  [pdf, other

    cs.CR cs.DC

    Recursive Augmented Fernet (RAF) Token: Alleviating the Pain of Stolen Tokens

    Authors: Reza Rahaeimehr, Marten van Dijk

    Abstract: A robust authentication and authorization mechanism is imperative in modular system development, where modularity and modular thinking are pivotal. Traditional systems often employ identity modules responsible for authentication and token issuance. Tokens, representing user credentials, offer advantages such as reduced reliance on passwords, limited lifespan, and scoped access. Despite these benef… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

  4. arXiv:2309.11012  [pdf, other

    cs.CR

    A Survey on Acoustic Side Channel Attacks on Keyboards

    Authors: Alireza Taheritajar, Zahra Mahmoudpour Harris, Reza Rahaeimehr

    Abstract: Most electronic devices utilize mechanical keyboards to receive inputs, including sensitive information such as authentication credentials, personal and private data, emails, plans, etc. However, these systems are susceptible to acoustic side-channel attacks. Researchers have successfully developed methods that can extract typed keystrokes from ambient noise. As the prevalence of keyboard-based in… ▽ More

    Submitted 25 September, 2023; v1 submitted 19 September, 2023; originally announced September 2023.

    Comments: 22 pages, conference