Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
{ARMageddon}: Cache attacks on mobile devices
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention
among the scientific community and powerful techniques to exploit cache side channels …
among the scientific community and powerful techniques to exploit cache side channels …
S $ A: A shared cache attack that works across cores and defies VM sandboxing--and its application to AES
The cloud computing infrastructure relies on virtualized servers that provide isolation across
guest OS's through sand boxing. This isolation was demonstrated to be imperfect in past …
guest OS's through sand boxing. This isolation was demonstrated to be imperfect in past …
A survey of side-channel attacks on caches and countermeasures
With the increasing proliferation of Internet-of-Things (IoT) in our daily lives, security and
trustworthiness are key considerations in designing computing devices. A vast majority of …
trustworthiness are key considerations in designing computing devices. A vast majority of …
{CacheD}: Identifying {Cache-Based} timing channels in production software
Side-channel attacks recover secret information by analyzing the physical implementation of
cryptosystems based on non-functional computational characteristics, eg time, power, and …
cryptosystems based on non-functional computational characteristics, eg time, power, and …
[HTML][HTML] A survey on the (in) security of trusted execution environments
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …
ever increasing need to protect our personal devices. As a matter of fact, more and more …
Eliminating timing side-channel leaks using program repair
We propose a method, based on program analysis and transformation, for eliminating timing
side channels in software code that implements security-critical applications. Our method …
side channels in software code that implements security-critical applications. Our method …
Sectee: A software-based approach to secure enclave architecture using tee
Secure enclaves provide a practical solution to secure computation, and current approaches
to secure enclaves are implemented by extending hardware security mechanisms to the …
to secure enclaves are implemented by extending hardware security mechanisms to the …
Return-oriented flush-reload side channels on arm and their implications for android devices
Cache side-channel attacks have been extensively studied on x86 architectures, but much
less so on ARM processors. The technical challenges to conduct side-channel attacks on …
less so on ARM processors. The technical challenges to conduct side-channel attacks on …
Hardware-security technologies for industrial IoT: TrustZone and security controller
C Lesjak, D Hein, J Winter - IECON 2015-41st Annual …, 2015 - ieeexplore.ieee.org
The transition from product-centric to service-centric business models presents a major
challenge to industrial automation and manufacturing systems. This transition increases …
challenge to industrial automation and manufacturing systems. This transition increases …