A survey on IoT-enabled home automation systems: Attacks and defenses

Z Wang, D Liu, Y Sun, X Pang, P Sun… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
With recent advances in communication technologies and Internet of Things (IoT)
infrastructures, home automation (HA) systems have emerged as a new promising paradigm …

Electrical-level attacks on CPUs, FPGAs, and GPUs: Survey and implications in the heterogeneous era

DG Mahmoud, V Lenders, M Stojilović - ACM Computing Surveys (CSUR …, 2022 - dl.acm.org
Given the need for efficient high-performance computing, computer architectures combining
central processing units (CPUs), graphics processing units (GPUs), and field-programmable …

[PDF][PDF] ASLR on the Line: Practical Cache Attacks on the MMU.

B Gras, K Razavi, E Bosman, H Bos, C Giuffrida - NDSS, 2017 - hydra.azilian.net
Address space layout randomization (ASLR) is an important first line of defense against
memory corruption attacks and a building block for many modern countermeasures. Existing …

ECDSA key extraction from mobile devices via nonintrusive physical side channels

D Genkin, L Pachmanov, I Pipman, E Tromer… - Proceedings of the …, 2016 - dl.acm.org
We show that elliptic-curve cryptography implementations on mobile devices are vulnerable
to electromagnetic and power side-channel attacks. We demonstrate full extraction of …

Parallel implementations of masking schemes and the bounded moment leakage model

G Barthe, F Dupressoir, S Faust, B Grégoire… - Advances in Cryptology …, 2017 - Springer
In this paper, we provide a necessary clarification of the good security properties that can be
obtained from parallel implementations of masking schemes. For this purpose, we first argue …

Differential computation analysis: Hiding your white-box designs is not enough

JW Bos, C Hubain, W Michiels, P Teuwen - … , CA, USA, August 17-19, 2016 …, 2016 - Springer
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …

Power-based side-channel instruction-level disassembler

J Park, X Xu, Y Jin, D Forte, M Tehranipoor - Proceedings of the 55th …, 2018 - dl.acm.org
Modern embedded computing devices are vulnerable against malware and software piracy
due to insufficient security scrutiny and the complications of continuous patching. To detect …

Smart home privacy protection methods against a passive wireless snooping side-channel attack

MA Nassiri Abrishamchi, A Zainal, FA Ghaleb… - Sensors, 2022 - mdpi.com
Smart home technologies have attracted more users in recent years due to significant
advancements in their underlying enabler components, such as sensors, actuators, and …

Leaky noise: New side-channel attack vectors in mixed-signal IoT devices

DRE Gnad, J Krautter, MB Tahoori - IACR Transactions on …, 2019 - tches.iacr.org
Microcontrollers and SoC devices have widely been used in Internet of Things applications.
This also brings the question whether they lead to new security threats unseen in traditional …