This paper analyzes a previously overlooked attack surface that allows unprivileged adversaries to impact supposedly secure floating-point computations in Intel SGX enclaves …
NF Ghalaty, B Yuce… - IEEE Embedded Systems …, 2016 - ieeexplore.ieee.org
In this letter, we analyze a class of recently proposed fault analysis techniques, which adopt a biased fault model. The purpose of our analysis is to evaluate the relative efficiency of …
Y Jin - 2019 IEEE computer society annual symposium on …, 2019 - ieeexplore.ieee.org
As computing devices become more commonplace in every day life, we have seen an increase of possible attacks on commercial devices and critical infrastructure. As a result …
New hardware primitives such as Intel SGX secure a user-level process in presence of an untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …
H Wang, H Li, F Rahman… - … on Computer-Aided …, 2021 - ieeexplore.ieee.org
Fault-injection attacks have become a major concern for hardware designs, primarily due to their powerful capability in tampering with critical locations in a device to cause violation of …
This contribution is concerned with the question whether an adversary can automatically manipulate an unknown FPGA bitstream realizing a cryptographic primitive such that the …
Y Zhong, U Guin - Proceedings of the Great Lakes Symposium on VLSI …, 2022 - dl.acm.org
Hardware implementations of cryptographic algorithms offer significantly higher throughput on both encryption and decryption than their software counterparts. Advanced Encryption …
S Nashimoto, D Suzuki, R Ueno… - IACR Transactions on …, 2022 - tches.iacr.org
RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted execution environment …
MM Ahmadi, F Khalid, R Vaidya, F Kriebel… - arXiv preprint arXiv …, 2023 - arxiv.org
Dynamic partial reconfiguration enables multi-tenancy in cloud-based FPGAs, which presents security challenges for tenants, IPs, and data. Malicious users can exploit FPGAs …