Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

{ARMageddon}: Cache attacks on mobile devices

M Lipp, D Gruss, R Spreitzer, C Maurice… - 25th USENIX Security …, 2016 - usenix.org
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention
among the scientific community and powerful techniques to exploit cache side channels …

S $ A: A shared cache attack that works across cores and defies VM sandboxing--and its application to AES

G Irazoqui, T Eisenbarth, B Sunar - 2015 IEEE Symposium on …, 2015 - ieeexplore.ieee.org
The cloud computing infrastructure relies on virtualized servers that provide isolation across
guest OS's through sand boxing. This isolation was demonstrated to be imperfect in past …

A survey of side-channel attacks on caches and countermeasures

Y Lyu, P Mishra - Journal of Hardware and Systems Security, 2018 - Springer
With the increasing proliferation of Internet-of-Things (IoT) in our daily lives, security and
trustworthiness are key considerations in designing computing devices. A vast majority of …

{CacheD}: Identifying {Cache-Based} timing channels in production software

S Wang, P Wang, X Liu, D Zhang, D Wu - 26th USENIX security …, 2017 - usenix.org
Side-channel attacks recover secret information by analyzing the physical implementation of
cryptosystems based on non-functional computational characteristics, eg time, power, and …

[HTML][HTML] A survey on the (in) security of trusted execution environments

A Muñoz, R Rios, R Román, J López - Computers & Security, 2023 - Elsevier
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …

Eliminating timing side-channel leaks using program repair

M Wu, S Guo, P Schaumont, C Wang - Proceedings of the 27th ACM …, 2018 - dl.acm.org
We propose a method, based on program analysis and transformation, for eliminating timing
side channels in software code that implements security-critical applications. Our method …

Sectee: A software-based approach to secure enclave architecture using tee

S Zhao, Q Zhang, Y Qin, W Feng, D Feng - Proceedings of the 2019 …, 2019 - dl.acm.org
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …

Return-oriented flush-reload side channels on arm and their implications for android devices

X Zhang, Y Xiao, Y Zhang - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Cache side-channel attacks have been extensively studied on x86 architectures, but much
less so on ARM processors. The technical challenges to conduct side-channel attacks on …

Hardware-security technologies for industrial IoT: TrustZone and security controller

C Lesjak, D Hein, J Winter - IECON 2015-41st Annual …, 2015 - ieeexplore.ieee.org
The transition from product-centric to service-centric business models presents a major
challenge to industrial automation and manufacturing systems. This transition increases …