A comprehensive survey of attacks without physical access targeting hardware vulnerabilities in iot/iiot devices, and their detection mechanisms
NF Polychronou, PH Thevenon, M Puys… - ACM Transactions on …, 2021 - dl.acm.org
With the advances in the field of the Internet of Things (IoT) and Industrial IoT (IIoT), these
devices are increasingly used in daily life or industry. To reduce costs related to the time …
devices are increasingly used in daily life or industry. To reduce costs related to the time …
Recent advancements in microarchitectural security: Review of machine learning countermeasures
Recent microarchitectural security countermeasures by employing applications' low-level
features collected from Hardware Performance Counters (HPCs) registers have emerged as …
features collected from Hardware Performance Counters (HPCs) registers have emerged as …
Detecting spectre attacks using hardware performance counters
C Li, JL Gaudiot - IEEE Transactions on Computers, 2021 - ieeexplore.ieee.org
Spectre attacks can be catastrophic and widespread because they exploit common design
flaws caused by the speculative capabilities in modern processors to leak sensitive data …
flaws caused by the speculative capabilities in modern processors to leak sensitive data …
Containerguard: A real-time attack detection system in container-based big data platform
As a lightweight, flexible, and high-performance operating system virtualization, containers
are used to speed up the big data platform. However, due to the imperfection of the resource …
are used to speed up the big data platform. However, due to the imperfection of the resource …
Scarf: Detecting side-channel attacks at real-time using low-level hardware features
Side-Channel Attacks (SCAs) are powerful attacks compromising the security of modern
computer systems by exploiting hardware vulnerabilities. Prior studies on detection of SCAs …
computer systems by exploiting hardware vulnerabilities. Prior studies on detection of SCAs …
Hybrid-shield: Accurate and efficient cross-layer countermeasure for run-time detection and mitigation of cache-based side-channel attacks
Cache-based Side-Channel Attacks (SCAs) exploit the emerging hardware vulnerabilities to
steal secret information by observing cache access patterns of cryptographic applications …
steal secret information by observing cache access patterns of cryptographic applications …
Automated detection of spectre and meltdown attacks using explainable machine learning
Spectre and Meltdown attacks exploit security vulnerabilities of advanced architectural
features to access inherently concealed memory data without authorization. Existing …
features to access inherently concealed memory data without authorization. Existing …
Phased-guard: Multi-phase machine learning framework for detection and identification of zero-day microarchitectural side-channel attacks
Microarchitectural Side-Channel Attacks (SCAs) have emerged recently to compromise the
security of computer systems by exploiting the existing processors' hardware vulnerabilities …
security of computer systems by exploiting the existing processors' hardware vulnerabilities …
Victims Can Be Saviors: A Machine Learning--based Detection for Micro-Architectural Side-Channel Attacks
Micro-architectural side-channel attacks are major threats to the most mathematically
sophisticated encryption algorithms. In spite of the fact that there exist several defense …
sophisticated encryption algorithms. In spite of the fact that there exist several defense …
This is how you lose the transient execution war
A Randal - arXiv preprint arXiv:2309.03376, 2023 - arxiv.org
A new class of vulnerabilities related to speculative and out-of-order execution, fault-
injection, and microarchitectural side channels rose to attention in 2018. The techniques …
injection, and microarchitectural side channels rose to attention in 2018. The techniques …