A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

Rambleed: Reading bits in memory without accessing them

A Kwong, D Genkin, D Gruss… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
The Rowhammer bug is a reliability issue in DRAM cells that can enable an unprivileged
adversary to flip the values of bits in neighboring rows on the memory module. Previous …

{DeepHammer}: Depleting the intelligence of deep neural networks through targeted chain of bit flips

F Yao, AS Rakin, D Fan - 29th USENIX Security Symposium (USENIX …, 2020 - usenix.org
Security of machine learning is increasingly becoming a major concern due to the
ubiquitous deployment of deep learning in many security-sensitive domains. Many prior …

The Effects of Side-Channel Attacks on Post-Quantum Cryptography: Influencing FrodoKEM Key Generation Using the Rowhammer Exploit

MJ Fahr - 2022 - search.proquest.com
Modern cryptographic algorithms such as AES and RSA are effectively used for securing
data transmission. However, advancements in quantum computing pose a threat to modern …

Speculative Execution Attack Methodologies (SEAM): An overview and component modelling of Spectre, Meltdown and Foreshadow attack methods

A Johnson, R Davies - 2019 7th International Symposium on …, 2019 - ieeexplore.ieee.org
Speculative execution has made a significant impact in the processing speed of computing
devices over the last circa 20 years. The functionality of modern CPU's to be able …

Key Schedule Guided Persistent Fault Attack

X Gong, F Zhang, X Zhao, J Xiao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Persistent Fault Analysis (PFA) is a powerful analysis technique proposed in CHES 2018,
which utilizes those faults that are injected before execution and persist throughout the …

LightRoAD: Lightweight rowhammer attack detector

M Taouil, C Reinbrecht, S Hamdioui… - 2021 IEEE Computer …, 2021 - ieeexplore.ieee.org
Dynamic Random Access Memory (DRAM)-based systems are widely used in mobile and
portable applications where low-cost and high-storage memory capability are required …

Derailed: Arbitrarily Controlling DNN Outputs with Targeted Fault Injection Attacks

J Ordoñez, C Yang - 2024 Design, Automation & Test in …, 2024 - ieeexplore.ieee.org
Hardware accelerators have been widely deployed to improve the efficiency of DNN
execution in terms of performance, power, and time predictability. Yet recent studies have …

Introducing The 'Unified Side Channel Attack-Model'(USCA-M)

A Johnson, R Ward - … on Digital Forensics and Security (ISDFS), 2020 - ieeexplore.ieee.org
This paper presents a 'Unified Side Channel Attack Model'(USCA-M). The USCA-M model is
compiled by the research undertaken of side-channel attacks (SCAs) from published journal …

[图书][B] Technology trend-driven reliable embedded system design

FS Hosseini - 2021 - search.proquest.com
Embedded systems are widely adopted in modern human society to perform a broad range
of tasks including many safety-critical, medical, and banking applications. Their reliability …