Systematic classification of side-channel attacks: A case study for mobile devices
R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …
Software grand exposure:{SGX} cache attacks are practical
F Brasser, U Müller, A Dmitrienko… - 11th USENIX workshop …, 2017 - usenix.org
Intel SGX isolates the memory of security-critical applications from the untrusted OS.
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
{ARMageddon}: Cache attacks on mobile devices
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention
among the scientific community and powerful techniques to exploit cache side channels …
among the scientific community and powerful techniques to exploit cache side channels …
A survey of side-channel attacks on caches and countermeasures
With the increasing proliferation of Internet-of-Things (IoT) in our daily lives, security and
trustworthiness are key considerations in designing computing devices. A vast majority of …
trustworthiness are key considerations in designing computing devices. A vast majority of …
[HTML][HTML] A survey on the (in) security of trusted execution environments
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …
ever increasing need to protect our personal devices. As a matter of fact, more and more …
Return-oriented flush-reload side channels on arm and their implications for android devices
Cache side-channel attacks have been extensively studied on x86 architectures, but much
less so on ARM processors. The technical challenges to conduct side-channel attacks on …
less so on ARM processors. The technical challenges to conduct side-channel attacks on …
SpyDetector: An approach for detecting side-channel attacks at runtime
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is
instrumental in detecting the presence of ongoing side-channel attacks at runtime. We are …
instrumental in detecting the presence of ongoing side-channel attacks at runtime. We are …
Fog computing in healthcare: a review
CA Da Silva… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The high cost of patient care has been a concern for the agencies responsible for this area
as this situation has been aggravated by the growth of the elderly population and the …
as this situation has been aggravated by the growth of the elderly population and the …
A timing side-channel attack on a mobile gpu
Mobile devices are quickly becoming powerful computing platforms in many respects. Given
the growing resource demands of applications, compute-heavy workloads on today's …
the growing resource demands of applications, compute-heavy workloads on today's …
Procharvester: Fully automated analysis of procfs side-channel leaks on android
R Spreitzer, F Kirchengast, D Gruss… - Proceedings of the 2018 …, 2018 - dl.acm.org
The procfs has been identified as a viable source of side-channel information leaks on
mobile devices. Starting with Android M (Android 6), access to the procfs has been …
mobile devices. Starting with Android M (Android 6), access to the procfs has been …