Power side-channel attack analysis: A review of 20 years of study for the layman
M Randolph, W Diehl - Cryptography, 2020 - mdpi.com
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in
which sensitive information can be recovered by analyzing physical phenomena of a device …
which sensitive information can be recovered by analyzing physical phenomena of a device …
Survey of microarchitectural side and covert channels, attacks, and defenses
J Szefer - Journal of Hardware and Systems Security, 2019 - Springer
Over the last two decades, side and covert channel research has shown a variety of ways of
exfiltrating information for a computer system. Processor microarchitectural timing-based …
exfiltrating information for a computer system. Processor microarchitectural timing-based …
An inside job: Remote power analysis attacks on FPGAs
This article presents how programmable resources of an FPGA can be utilized to perform
side-channel attacks and reports practical examples of these attacks.-Rosario Cammarota …
side-channel attacks and reports practical examples of these attacks.-Rosario Cammarota …
Containerleaks: Emerging security threats of information leakages in container clouds
Container technology provides a lightweight operating system level virtual hosting
environment. Its emergence profoundly changes the development and deployment …
environment. Its emergence profoundly changes the development and deployment …
Vale: Verifying {High-Performance} Cryptographic Assembly Code
B Bond, C Hawblitzel, M Kapritsos, KRM Leino… - 26th USENIX security …, 2017 - usenix.org
High-performance cryptographic code often relies on complex hand-tuned assembly
language that is customized for individual hardware platforms. Such code is difficult to …
language that is customized for individual hardware platforms. Such code is difficult to …
Telekine: Secure computing with cloud {GPUs}
GPUs have become ubiquitous in the cloud due to the dramatic performance gains they
enable in domains such as machine learning and computer vision. However, offloading …
enable in domains such as machine learning and computer vision. However, offloading …
Temporal thermal covert channels in cloud FPGAs
With increasing interest in Cloud FPGAs, such as Amazon's EC2 F1 instances or Microsoft's
Azure with Catapult servers, FPGAs in cloud computing infrastructures can become targets …
Azure with Catapult servers, FPGAs in cloud computing infrastructures can become targets …
Remote inter-chip power analysis side-channel attacks at board-level
The current practice in board-level integration is to incorporate chips and components from
numerous vendors. A fully trusted supply chain for all used components and chipsets is an …
numerous vendors. A fully trusted supply chain for all used components and chipsets is an …
Houdini's escape: Breaking the resource rein of linux control groups
Linux Control Groups, ie, cgroups, are the key building blocks to enable operating-system-
level containerization. The cgroups mechanism partitions processes into hierarchical groups …
level containerization. The cgroups mechanism partitions processes into hierarchical groups …
Covert channels through random number generator: Mechanisms, capacity estimation and mitigations
D Evtyushkin, D Ponomarev - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Covert channels present serious security threat because they allow secret communication
between two malicious processes even if the system inhibits direct communication. We …
between two malicious processes even if the system inhibits direct communication. We …