Timing-based side-channels play an important role in exposing the state of a process execution on underlying hardware by revealing information about timing and access …
High resolution and stealthy attacks and their variants such as Flush+ Reload, Flush+ Flush, Prime+ Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel's …
Z Pan, P Mishra - IEEE Access, 2022 - ieeexplore.ieee.org
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to support its core functionalities. A typical SoC consists of diverse components gathered from …
BA Ahmad - arXiv preprint arXiv:2006.01442, 2020 - arxiv.org
Recently discovered Spectre and meltdown attacks affects almost all processors by leaking confidential information to other processes through side-channel attacks. These …
Cache Side Channel Attacks (SCAs) have gained a lot of attention in the recent past. Since, these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous …
A cache side-channel attack retrieves victim's sensitive information from a system by exploiting shared cache of CPUs. Since conventional cache side-channel attacks such as …
In the last 15 years, we have witnessed a never-ending arm's race between the attacker and the defender with respect to cache-based side-channel attacks. We have seen a slew of …
Hardware attacks on resource-constrained IoT devices are evolving rapidly. These threats have become a significant concern due to the increase of IoT devices used in applications …
Z Tong, Z Zhu, Z Wang, L Wang… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Security has always been one of the main concerns in the field of computer architecture and cloud computing. Cache-based side-channel attacks pose a threat to almost all existing …