Power side-channel attack analysis: A review of 20 years of study for the layman

M Randolph, W Diehl - Cryptography, 2020 - mdpi.com
Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in
which sensitive information can be recovered by analyzing physical phenomena of a device …

Survey of microarchitectural side and covert channels, attacks, and defenses

J Szefer - Journal of Hardware and Systems Security, 2019 - Springer
Over the last two decades, side and covert channel research has shown a variety of ways of
exfiltrating information for a computer system. Processor microarchitectural timing-based …

An inside job: Remote power analysis attacks on FPGAs

F Schellenberg, DRE Gnad, A Moradi… - IEEE Design & …, 2021 - ieeexplore.ieee.org
This article presents how programmable resources of an FPGA can be utilized to perform
side-channel attacks and reports practical examples of these attacks.-Rosario Cammarota …

Containerleaks: Emerging security threats of information leakages in container clouds

X Gao, Z Gu, M Kayaalp, D Pendarakis… - 2017 47th Annual …, 2017 - ieeexplore.ieee.org
Container technology provides a lightweight operating system level virtual hosting
environment. Its emergence profoundly changes the development and deployment …

Vale: Verifying {High-Performance} Cryptographic Assembly Code

B Bond, C Hawblitzel, M Kapritsos, KRM Leino… - 26th USENIX security …, 2017 - usenix.org
High-performance cryptographic code often relies on complex hand-tuned assembly
language that is customized for individual hardware platforms. Such code is difficult to …

Telekine: Secure computing with cloud {GPUs}

T Hunt, Z Jia, V Miller, A Szekely, Y Hu… - … USENIX Symposium on …, 2020 - usenix.org
GPUs have become ubiquitous in the cloud due to the dramatic performance gains they
enable in domains such as machine learning and computer vision. However, offloading …

Temporal thermal covert channels in cloud FPGAs

S Tian, J Szefer - Proceedings of the 2019 ACM/SIGDA International …, 2019 - dl.acm.org
With increasing interest in Cloud FPGAs, such as Amazon's EC2 F1 instances or Microsoft's
Azure with Catapult servers, FPGAs in cloud computing infrastructures can become targets …

Remote inter-chip power analysis side-channel attacks at board-level

F Schellenberg, DRE Gnad, A Moradi… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
The current practice in board-level integration is to incorporate chips and components from
numerous vendors. A fully trusted supply chain for all used components and chipsets is an …

Houdini's escape: Breaking the resource rein of linux control groups

X Gao, Z Gu, Z Li, H Jamjoom, C Wang - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Linux Control Groups, ie, cgroups, are the key building blocks to enable operating-system-
level containerization. The cgroups mechanism partitions processes into hierarchical groups …

Covert channels through random number generator: Mechanisms, capacity estimation and mitigations

D Evtyushkin, D Ponomarev - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Covert channels present serious security threat because they allow secret communication
between two malicious processes even if the system inhibits direct communication. We …