J Seibert, H Okhravi, E Söderström - Proceedings of the 2014 ACM …, 2014 - dl.acm.org
Code diversification has been proposed as a technique to mitigate code reuse attacks, which have recently become the predominant way for attackers to exploit memory corruption …
R Gilmore, N Hanley, M O'Neill - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this …
Differential Power Analysis (DPA) measures single-bit differences between data values used in computer systems by statistical analysis of power traces. In this paper, we show that …
H Luo, C Wang, H Luo, F Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) devices are widely deployed nowadays. A large number of smart home IoT devices are hosted on a cloud server for easy management. Users can use their …
MA KF, V Ganesan, R Bodduna… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The power consumption of a microprocessor is a huge channel for information leakage. While the most popular exploitation of this channel is to recover cryptographic keys from …
In recent years, smartphones have become an increasingly important storage facility for personal sensitive data ranging from photos and credentials up to financial and medical …
USB-based attacks have increased in complexity in recent years. Modern attacks now incorporate a wide range of attack vectors, from social engineering to signal injection. To …
C Drewes, O Weng, K Ryan, B Hunter… - Proceedings of the …, 2023 - dl.acm.org
Voltage fluctuation sensors measure minute changes in an FPGA power distribution network, allowing attackers to extract information from concurrently executing computations …
D Strobel, D Oswald, B Richter… - Proceedings of the …, 2014 - ieeexplore.ieee.org
Often overlooked, microcontrollers are the central component in embedded systems which drive the evolution toward the Internet of Things (IoT). They are small, easy to handle, low …