Modern CPUs dynamically scale voltage and frequency for efficiency. However, too low voltages can result in security-critical errors. Hence, vendors use a generous safety margin …
A Randal - arXiv preprint arXiv:2309.03376, 2023 - arxiv.org
A new class of vulnerabilities related to speculative and out-of-order execution, fault- injection, and microarchitectural side channels rose to attention in 2018. The techniques …
Covert channels and side channels bypass architectural security boundaries. Numerous works have studied covert channels and side channels in software and hardware. Thus …
F Rauscher, C Fiedler, A Kogler… - … and Distributed System …, 2025 - graz.elsevierpure.com
CPU caches are among the most widely studied side-channel targets, with Prime+ Probe and Flush+ Reload being the most prominent techniques. These generic cache attack …
OL Gonidec, MM Real, G Bouffard… - arXiv preprint arXiv …, 2024 - arxiv.org
Over the past few years, several research groups have introduced innovative hardware designs for Trusted Execution Environments (TEEs), aiming to secure applications against …
Abstract Acoustic Side-Channel Attacks (ASCAs) extract sensitive information by using audio emitted from a computing devices and their peripherals. Attacks targeting keyboards …
N Mishra, TL Dutta, S Shukla… - … Security and Trust …, 2024 - ieeexplore.ieee.org
Energy consumption trends from reporting interfaces like Running Average Power Limit (RAPL) can be leveraged by remote adversaries to mount software counterparts of power …
S Shen, C Jin - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Garbled circuits (GC) are a secure multiparty computation protocol that enables two parties to jointly compute a function using their private data without revealing it to each other. While …
Side-channel information consists of side effects of computation that range from microarchitectural to physical phenomena. Empirical studies have demonstrated the …