A survey on machine-learning based security design for cyber-physical systems

S Kim, KJ Park - Applied Sciences, 2021 - mdpi.com
A cyber-physical system (CPS) is the integration of a physical system into the real world and
control applications in a computing system, interacting through a communications network …

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA

M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti… - Information Systems, 2020 - Elsevier
Timing-based side-channels play an important role in exposing the state of a process
execution on underlying hardware by revealing information about timing and access …

WHISPER: A tool for run-time detection of side-channel attacks

M Mushtaq, J Bricq, MK Bhatti, A Akram… - IEEE …, 2020 - ieeexplore.ieee.org
High resolution and stealthy attacks and their variants such as Flush+ Reload, Flush+ Flush,
Prime+ Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel's …

A survey on hardware vulnerability analysis using machine learning

Z Pan, P Mishra - IEEE Access, 2022 - ieeexplore.ieee.org
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …

Real time detection of spectre and meltdown attacks using machine learning

BA Ahmad - arXiv preprint arXiv:2006.01442, 2020 - arxiv.org
Recently discovered Spectre and meltdown attacks affects almost all processors by leaking
confidential information to other processes through side-channel attacks. These …

Meet the Sherlock Holmes' of side channel leakage: A survey of cache SCA detection techniques

A Akram, M Mushtaq, MK Bhatti, V Lapotre… - IEEE …, 2020 - ieeexplore.ieee.org
Cache Side Channel Attacks (SCAs) have gained a lot of attention in the recent past. Since,
these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous …

Deep learning based detection for multiple cache side-channel attacks

H Kim, C Hahn, HJ Kim, Y Shin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
A cache side-channel attack retrieves victim's sensitive information from a system by
exploiting shared cache of CPUs. Since conventional cache side-channel attacks such as …

Toward an Optimal Countermeasure for Cache Side-Channel Attacks

N Shrivastava, SR Sarangi - IEEE Embedded Systems Letters, 2022 - ieeexplore.ieee.org
In the last 15 years, we have witnessed a never-ending arm's race between the attacker and
the defender with respect to cache-based side-channel attacks. We have seen a slew of …

Neuromorphic-enabled security for IoT

S Salehi, T Sheaves, KI Gubbi… - 2022 20th IEEE …, 2022 - ieeexplore.ieee.org
Hardware attacks on resource-constrained IoT devices are evolving rapidly. These threats
have become a significant concern due to the increase of IoT devices used in applications …

Cache side-channel attacks detection based on machine learning

Z Tong, Z Zhu, Z Wang, L Wang… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
Security has always been one of the main concerns in the field of computer architecture and
cloud computing. Cache-based side-channel attacks pose a threat to almost all existing …