Plundervolt: Software-based fault injection attacks against Intel SGX

K Murdock, D Oswald, FD Garcia… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …

{CLKSCREW}: Exposing the perils of {Security-Oblivious} energy management

A Tang, S Sethumadhavan, S Stolfo - 26th USENIX Security Symposium …, 2017 - usenix.org
The need for power-and energy-efficient computing has resulted in aggressive cooperative
hardware-software energy management mechanisms on modern commodity devices. Most …

Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies

P Qiu, D Wang, Y Lyu, G Qu - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
ARM TrustZone builds a trusted execution environment based on the concept of hardware
separation. It has been quite successful in defending against various software attacks and …

{VoltPillager}: Hardware-based fault injection attacks against Intel {SGX} Enclaves using the {SVID} voltage scaling interface

Z Chen, G Vasilakis, K Murdock, E Dean… - 30th USENIX Security …, 2021 - usenix.org
Hardware-based fault injection attacks such as voltage and clock glitching have been
thoroughly studied on embedded devices. Typical targets for such attacks include …

Fault sensitivity analysis

Y Li, K Sakiyama, S Gomisawa, T Fukunaga… - … and Embedded Systems …, 2010 - Springer
This paper proposes a new fault-based attack called the Fault Sensitivity Analysis (FSA)
attack, which unlike most existing fault-based analyses including Differential Fault Analysis …

Information leaks without memory disclosures: Remote side channel attacks on diversified code

J Seibert, H Okhravi, E Söderström - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Code diversification has been proposed as a technique to mitigate code reuse attacks,
which have recently become the predominant way for attackers to exploit memory corruption …

Persistent fault analysis on block ciphers

F Zhang, X Lou, X Zhao, S Bhasin, W He… - IACR Transactions on …, 2018 - tches.iacr.org
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions
for years. In this paper, the feature of persistence is applied to fault attacks, and the …

Differential fault intensity analysis

NF Ghalaty, B Yuce, M Taha… - 2014 Workshop on Fault …, 2014 - ieeexplore.ieee.org
Recent research has demonstrated that there is no sharp distinction between passive
attacks based on side-channel leakage and active attacks based on fault injection. Fault …

Side-channel attack in Internet of Things: A survey

M Devi, A Majumder - Applications of Internet of Things: Proceedings of …, 2021 - Springer
To ensure security for data exchange is a challenges task in Internet of Things (IoT). Thus,
research on side-channel attack is a major issue in this domain. Side-channel attack is …

Hardware Trojan horses in cryptographic IP cores

S Bhasin, JL Danger, S Guilley, XT Ngo… - 2013 Workshop on …, 2013 - ieeexplore.ieee.org
Detecting hardware trojans is a difficult task in general. In this article we study hardware
trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The …