Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

Software grand exposure:{SGX} cache attacks are practical

F Brasser, U Müller, A Dmitrienko… - 11th USENIX workshop …, 2017 - usenix.org
Intel SGX isolates the memory of security-critical applications from the untrusted OS.
However, it has been speculated that SGX may be vulnerable to side-channel attacks …

{ARMageddon}: Cache attacks on mobile devices

M Lipp, D Gruss, R Spreitzer, C Maurice… - 25th USENIX Security …, 2016 - usenix.org
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention
among the scientific community and powerful techniques to exploit cache side channels …

A survey of side-channel attacks on caches and countermeasures

Y Lyu, P Mishra - Journal of Hardware and Systems Security, 2018 - Springer
With the increasing proliferation of Internet-of-Things (IoT) in our daily lives, security and
trustworthiness are key considerations in designing computing devices. A vast majority of …

[HTML][HTML] A survey on the (in) security of trusted execution environments

A Muñoz, R Rios, R Román, J López - Computers & Security, 2023 - Elsevier
As the number of security and privacy attacks continue to grow around the world, there is an
ever increasing need to protect our personal devices. As a matter of fact, more and more …

Return-oriented flush-reload side channels on arm and their implications for android devices

X Zhang, Y Xiao, Y Zhang - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Cache side-channel attacks have been extensively studied on x86 architectures, but much
less so on ARM processors. The technical challenges to conduct side-channel attacks on …

SpyDetector: An approach for detecting side-channel attacks at runtime

Y Kulah, B Dincer, C Yilmaz, E Savas - International Journal of Information …, 2019 - Springer
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is
instrumental in detecting the presence of ongoing side-channel attacks at runtime. We are …

Fog computing in healthcare: a review

CA Da Silva… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The high cost of patient care has been a concern for the agencies responsible for this area
as this situation has been aggravated by the growth of the elderly population and the …

A timing side-channel attack on a mobile gpu

E Karimi, ZH Jiang, Y Fei, D Kaeli - 2018 IEEE 36th …, 2018 - ieeexplore.ieee.org
Mobile devices are quickly becoming powerful computing platforms in many respects. Given
the growing resource demands of applications, compute-heavy workloads on today's …

Procharvester: Fully automated analysis of procfs side-channel leaks on android

R Spreitzer, F Kirchengast, D Gruss… - Proceedings of the 2018 …, 2018 - dl.acm.org
The procfs has been identified as a viable source of side-channel information leaks on
mobile devices. Starting with Android M (Android 6), access to the procfs has been …