P Chakraborty, J Cruz, C Posada… - IEEE embedded …, 2021 - ieeexplore.ieee.org
Information leakage via timing side-channel analysis can compromise embedded systems used in diverse applications that are otherwise secure. Most state-of-the-art timing side …
RISC–V is an emerging technology, with applications ranging from embedded devices to high-performance servers. Therefore, more and more security-critical workloads will be …
Timing attacks are among the most devastating side-channel attacks, allowing remote attackers to retrieve secret material, including cryptographic keys, with relative ease. In …
M Wu, S Guo, P Schaumont, C Wang - Proceedings of the 27th ACM …, 2018 - dl.acm.org
We propose a method, based on program analysis and transformation, for eliminating timing side channels in software code that implements security-critical applications. Our method …
T Brennan, N Rosner, T Bultan - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Side-channel vulnerabilities in software are caused by an observable imbalance in resource usage across different program paths. We show that just-in-time (JIT) compilation, which is …
Research showed that microarchitectural attacks like cache attacks can be performed through websites using JavaScript. These timing attacks allow an adversary to spy on users …
ZB Aweke, T Austin - 2018 Design, Automation & Test in …, 2018 - ieeexplore.ieee.org
Time variation during program execution can leak sensitive information. Time variations due to program control flow and hardware resource contention have been used to steal …
Keystrokes trigger interrupts which can be detected through software side channels to reconstruct keystroke timings. Keystroke timing attacks use these side channels to infer …
JavaScript-based timing attacks have been greatly explored over the last few years. They rely on subtle timing differences to infer information that should not be available inside of the …