Plundervolt: Software-based fault injection attacks against Intel SGX
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …
growing heat and power consumption in modern processors. Design restrictions ensure …
Another flip in the wall of rowhammer defenses
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …
unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated …
Rambleed: Reading bits in memory without accessing them
The Rowhammer bug is a reliability issue in DRAM cells that can enable an unprivileged
adversary to flip the values of bits in neighboring rows on the memory module. Previous …
adversary to flip the values of bits in neighboring rows on the memory module. Previous …
Reliability-aware design to suppress aging
Due to aging, circuit reliability has become extraordinary challenging. Reliability-aware
circuit design flows do virtually not exist and even research is in its infancy. In this paper, we …
circuit design flows do virtually not exist and even research is in its infancy. In this paper, we …
[PDF][PDF] Untrustzone: Systematic accelerated aging to expose on-chip secrets
As technology scaling brings society closer to the vision of smart dust, system designers
must address the threat of physical attacks. To address the threat of physical access to …
must address the threat of physical attacks. To address the threat of physical access to …
Pseudorandom black swans: Cache attacks on CTR_DRBG
Modern cryptography requires the ability to securely generate pseudorandom numbers.
However, despite decades of work on side-channel attacks, there is little discussion of their …
However, despite decades of work on side-channel attacks, there is little discussion of their …
Detecting failures and attacks via digital sensors
Detection of abnormal behaviors is essential in complex and/or strategic systems requiring a
high level of safety and security. Sensing environmental conditions to ensure that the device …
high level of safety and security. Sensing environmental conditions to ensure that the device …
Aadam: A fast, accurate, and versatile aging-aware cell library delay model using feed-forward neural network
SM Ebrahimipour, B Ghavami, H Mousavi… - Proceedings of the 39th …, 2020 - dl.acm.org
With the CMOS technology scaling, transistor aging has become one major issue affecting
circuit reliability and lifetime. There are two major classes of existing studies that model the …
circuit reliability and lifetime. There are two major classes of existing studies that model the …
An on-chip dynamically obfuscated wrapper for protecting supply chain against IP and IC piracies
With the modern semiconductor supply chain, the ownership of both intellectual property (IP)
and integrated circuit (IC) cannot be guaranteed. The IP piracy may take place at the …
and integrated circuit (IC) cannot be guaranteed. The IP piracy may take place at the …
Emerging (un-) reliability based security threats and mitigations for embedded systems: Special session
This paper addresses two reliability-based security threats and mitigations for embedded
systems namely, aging and thermal side channels. Device aging can be used as a hardware …
systems namely, aging and thermal side channels. Device aging can be used as a hardware …