Plundervolt: Software-based fault injection attacks against Intel SGX

K Murdock, D Oswald, FD Garcia… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …

Another flip in the wall of rowhammer defenses

D Gruss, M Lipp, M Schwarz, D Genkin… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …

Rambleed: Reading bits in memory without accessing them

A Kwong, D Genkin, D Gruss… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
The Rowhammer bug is a reliability issue in DRAM cells that can enable an unprivileged
adversary to flip the values of bits in neighboring rows on the memory module. Previous …

Reliability-aware design to suppress aging

H Amrouch, B Khaleghi, A Gerstlauer… - Proceedings of the 53rd …, 2016 - dl.acm.org
Due to aging, circuit reliability has become extraordinary challenging. Reliability-aware
circuit design flows do virtually not exist and even research is in its infancy. In this paper, we …

[PDF][PDF] Untrustzone: Systematic accelerated aging to expose on-chip secrets

J Mahmod, M Hicks - 2024 IEEE Symposium on Security and …, 2024 - forte-research.com
As technology scaling brings society closer to the vision of smart dust, system designers
must address the threat of physical attacks. To address the threat of physical access to …

Pseudorandom black swans: Cache attacks on CTR_DRBG

S Cohney, A Kwong, S Paz, D Genkin… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Modern cryptography requires the ability to securely generate pseudorandom numbers.
However, despite decades of work on side-channel attacks, there is little discussion of their …

Detecting failures and attacks via digital sensors

MTH Anik, JL Danger, S Guilley… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Detection of abnormal behaviors is essential in complex and/or strategic systems requiring a
high level of safety and security. Sensing environmental conditions to ensure that the device …

Aadam: A fast, accurate, and versatile aging-aware cell library delay model using feed-forward neural network

SM Ebrahimipour, B Ghavami, H Mousavi… - Proceedings of the 39th …, 2020 - dl.acm.org
With the CMOS technology scaling, transistor aging has become one major issue affecting
circuit reliability and lifetime. There are two major classes of existing studies that model the …

An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies

D Zhang, X Wang, MT Rahman… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the modern semiconductor supply chain, the ownership of both intellectual property (IP)
and integrated circuit (IC) cannot be guaranteed. The IP piracy may take place at the …

Emerging (un-) reliability based security threats and mitigations for embedded systems: Special session

H Amrouch, P Krishnamurthy, N Patel… - Proceedings of the …, 2017 - dl.acm.org
This paper addresses two reliability-based security threats and mitigations for embedded
systems namely, aging and thermal side channels. Device aging can be used as a hardware …