A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

Timing Side-Channel Attacks and Countermeasures in CPU Microarchitectures

J Zhang, C Chen, J Cui, K Li - ACM Computing Surveys, 2024 - dl.acm.org
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle
microarchitecture state to steal the user's secret data and even compromise the operating …

{ScatterCache}: thwarting cache attacks via cache set randomization

M Werner, T Unterluggauer, L Giner… - 28th USENIX Security …, 2019 - usenix.org
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …

Theory and practice of finding eviction sets

P Vila, B Köpf, JF Morales - 2019 IEEE Symposium on Security …, 2019 - ieeexplore.ieee.org
Many micro-architectural attacks rely on the capability of an attacker to efficiently find small
eviction sets: groups of virtual addresses that map to the same cache set. This capability has …

Systematic analysis of randomization-based protected cache architectures

A Purnal, L Giner, D Gruss… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Recent secure cache designs aim to mitigate side-channel attacks by randomizing the
mapping from memory addresses to cache sets. As vendors investigate deployment of these …

{HybCache}: Hybrid {Side-Channel-Resilient} caches for trusted execution environments

G Dessouky, T Frassetto, AR Sadeghi - 29th USENIX Security …, 2020 - usenix.org
Modern multi-core processors share cache resources for maximum cache utilization and
performance gains. However, this leaves the cache vulnerable to side-channel attacks …

Machine learning in real-time Internet of Things (IoT) systems: A survey

J Bian, A Al Arafat, H Xiong, J Li, L Li… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Over the last decade, machine learning (ML) and deep learning (DL) algorithms have
significantly evolved and been employed in diverse applications, such as computer vision …

Evaluation framework for electric vehicle security risk assessment

S Shirvani, Y Baseri, A Ghorbani - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Electric Vehicles (EVs) seem promising for future transportation to solve environmental
concerns and energy management problems. According to Reuters, global car makers plan …

SoK: Secure FPGA multi-tenancy in the cloud: Challenges and opportunities

G Dessouky, AR Sadeghi… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Field Programmable Gate Arrays (FPGAs) are increasingly deployed in datacenters due to
their inherent flexibility over ASICs or GPUs that makes them an ideal processing unit for …

Virtualization on TrustZone-enabled microcontrollers? Voilà!

S Pinto, H Araujo, D Oliveira, J Martins… - 2019 IEEE Real-Time …, 2019 - ieeexplore.ieee.org
With predictions pointing to more than 20 billion Internet-enabled'things' by 2020 and much
more to come, smart sensor nodes are expected to be predominant in the Internet of Things …