A review of security issues and solutions for precision health in Internet-of-Medical-Things systems

N Li, M Xu, Q Li, J Liu, S Bao, Y Li, J Li… - Security and …, 2023 - sands.edpsciences.org
Precision medicine provides a holistic perspective of an individual's health, including
genetic, environmental, and lifestyle aspects to realize individualized therapy. The …

Modern Hardware Security: A Review of Attacks and Countermeasures

J Mishra, SK Sahay - arXiv preprint arXiv:2501.04394, 2025 - arxiv.org
With the exponential rise in the use of cloud services, smart devices, and IoT devices,
advanced cyber attacks have become increasingly sophisticated and ubiquitous …

MeshUp: Stateless cache side-channel attack on CPU mesh

J Wan, Y Bi, Z Zhou, Z Li - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
Cache side-channel attacks lead to severe security threats to the settings where a CPU is
shared across users, eg, in the cloud. The majority of attacks rely on sensing the micro …

Write me and I'll tell you secrets–write-after-write effects on Intel CPUs

JP Thoma, T Güneysu - … of the 25th International Symposium on …, 2022 - dl.acm.org
There is a long history of side channels in the memory hierarchy of modern CPUs.
Especially the cache side channel is widely used in the context of transient execution attacks …

{SCARF}–A {Low-Latency} Block Cipher for Secure {Cache-Randomization}

F Canale, T Güneysu, G Leander, JP Thoma… - 32nd USENIX Security …, 2023 - usenix.org
Randomized cache architectures have proven to significantly increase the complexity of
contention-based cache side channel attacks and therefore present an important building …

Scatter and split securely: Defeating cache contention and occupancy attacks

L Giner, S Steinegger, A Purnal… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
In this paper, we propose SassCache, a secure skewed associative cache with keyed index
mapping. For this purpose, we design a new two-layered, low-latency cryptographic …

Chunked-cache: On-demand and scalable cache isolation for security architectures

G Dessouky, A Gruler, P Mahmoody… - arXiv preprint arXiv …, 2021 - arxiv.org
Shared cache resources in multi-core processors are vulnerable to cache side-channel
attacks. Recently proposed defenses have their own caveats: Randomization-based …

Cache refinement type for side-channel detection of cryptographic software

K Jiang, Y Bao, S Wang, Z Liu, T Zhang - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Cache side-channel attacks exhibit severe threats to software security and privacy,
especially for cryptosystems. In this paper, we propose CaType, a novel refinement type …

Are randomized caches truly random? Formal analysis of randomized-partitioned caches

A Chakraborty, S Bhattacharya, S Saha… - … Symposium on High …, 2023 - ieeexplore.ieee.org
Cache based side-channel attacks exploit the fact that an adversary can setup the shared
cache memory (the last level cache in modern systems) into a known state and detect any …

Bespoke cache enclaves: Fine-grained and scalable isolation from cache side-channels via flexible set-partitioning

G Saileshwar, S Kariyappa… - … Symposium on Secure …, 2021 - ieeexplore.ieee.org
Cache partitioning is a principled defense against side-channel attacks on shared last-level
caches (LLCs). Such defenses allocate isolated cache regions to distrusting applications …