[PDF][PDF] BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect

C Rodrigues, D Oliveira, S Pinto - 2024 IEEE Symposium on Security …, 2023 - crosscon.eu
Spectre and Meltdown have pushed the research community toward an otherwise-
unavailable understanding of the security implications of processors' microarchitecture …

Where's the" up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems

X Tan, Z Ma, S Pinto, L Guan, N Zhang, J Xu… - arXiv preprint arXiv …, 2024 - arxiv.org
Arm Cortex-M processors are the most widely used 32-bit microcontrollers among
embedded and Internetof-Things devices. Despite the widespread usage, there has been …

Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis

XM Saß, T Krachenfels, FD Pustelnik… - Proceedings of the …, 2023 - dl.acm.org
Physical attacks form one of the most severe threats against secure computing platforms.
Their criticality arises from their corresponding threat model: By, eg, passively measuring an …

Keyless Entry: Breaking and Entering eMMC RPMB with EMFI

A Fukami, R Buurke - Proceedings of the 17th ACM Conference on …, 2024 - dl.acm.org
The Replay Protected Memory Block (RPMB) in modern storage systems provides a secure
area where data integrity is ensured by authentication. This block is used in digital devices …

Defending the Citadel: Fault Injection Attacks against Dynamic Information Flow Tracking and Related Countermeasures

W Pensec, F Regazzoni, V Lapotre… - 2024 IEEE Computer …, 2024 - hal.science
Embedded processors are key components of Internet of Things (IoT) devices of Cyber-
Physical Systems (CPSs) that manipulate sensitive data. In order to mitigate software …

Another Break in the Wall: Harnessing Fault Injection Attacks to Penetrate Software Fortresses

W Pensec, V Lapôtre, G Gogniat - … of the First International Workshop on …, 2023 - dl.acm.org
Internet of Things (IoT) devices manipulate sensitive data leading to strict security needs.
They face both software and physical attacks due to their network connectivity and their …

[PDF][PDF] Hardware Extensions and Compiler Support for Protection Against Fault Attacks

S Mangard - 2023 - rschilling.net
Software is ubiquitous in all applications of modern lives. The correct execution of software
is essential for the functionality and security of the underlying device. Fault attacks …

Evaluation of the security of embedded systems against fault injection attacks

N Tziris-Georgopoulos - 2023 - dione.lib.unipi.gr
The increasing use of embedded systems highlights the significance of hardware security,
leading to research on hardware attacks. Fault injection attacks via voltage glitch represent a …

[引用][C] A Novel Simulation Approach for Fault Injection Mechanism Assessing Dependability of Cybersecurity Attacks

S Kaur, A Sachdeva - Journal of Circuits, Systems and Computers, 2024 - World Scientific
Clock attacks and power attacks are used as common means to inject faults in embedded
devices. Critical analysis of the properties and the components engaged with these fault …