P Borkar, C Chen, M Rostami, N Singh… - arXiv preprint arXiv …, 2024 - usenix.org
Timing vulnerabilities in processors have emerged as a potent threat. As processors are the foundation of any computing system, identifying these flaws is imperative. Recently fuzzing …
Microarchitectural attacks compromise security by exploiting software-visible artifacts of microarchitectural optimizations such as caches and speculative execution. Defending …
Physical side-channel attacks are powerful attacks that exploit a device's physical emanations to break the security of cryptographic implementations. Many countermeasures …
Physical side-channel attacks exploit a device's emanations to compromise the security of cryptographic implementations. Many countermeasures have been proposed against these …
J Haring, V Hadži, R Bloem - IACR Transactions on Cryptographic …, 2024 - tches.iacr.org
Security verification of masked software implementations of cryptographic algorithms must account for microarchitectural side-effects of CPUs. Leakage contracts were proposed to …
K Miteloudi, A Adhikary, N van Drueten… - Cryptology ePrint …, 2024 - eprint.iacr.org
Hardening microprocessors against side-channel attacks is a critical aspect of ensuring their security. A key step in this process is identifying and mitigating “leaky” hardware modules …
The protection of cryptographic implementations against side-channel attacks is essential. Side-channel attacks exploit the secret-dependent information contained in the power …
Embedded and IoT devices rely on cryptographic building blocks to protect sensitive user data from unrestricted access. Cryptographic algorithms have been designed to provide …
The masking countermeasure is among the most potent countermeasures to counteract side- channel attacks. Leakage models have been exhibited to theoretically reason on the …