Hardware-based methods for electronic device protection against invasive and non-invasive attacks

M Vidaković, D Vinko - Electronics, 2023 - mdpi.com
This paper reviews hardware-based protection methods for electronic devices,
encompassing scientific publications and published patents. This review covers insights …

Repttack: Exploiting cloud schedulers to guide co-location attacks

C Fang, H Wang, N Nazari, B Omidi, A Sasan… - arXiv preprint arXiv …, 2021 - arxiv.org
Cloud computing paradigms have emerged as a major facility to store and process the
massive data produced by various business units, public organizations, Internet-of-Things …

[PDF][PDF] HeteroScore: Evaluating and mitigating cloud security threats brought by heterogeneity

C Fang, N Nazari, B Omidi, H Wang, A Puri… - The Network and …, 2023 - par.nsf.gov
Cloud computing has emerged as a critical part of commercial computing infrastructure due
to its computing power, data storage capabilities, scalability, software/API integration, and …

CR-Spectre: Defense-aware ROP injected code-reuse based dynamic spectre

A Dhavlle, S Rafatirad, H Homayoun… - … , Automation & Test …, 2022 - ieeexplore.ieee.org
Side-channel attacks have been a constant threat to computing systems. In recent times,
vulnerabilities in the architecture were discovered and exploited to mount and execute a …

Special Session: Detecting and Defending Vulnerabilities in Heterogeneous and Monolithic Systems: Current Strategies and Future Directions

VN Patnala, SMP Dinakarrao… - … , and Synthesis for …, 2024 - ieeexplore.ieee.org
Embedded systems are evolving in complexity, leading to the emergence of multiple threats.
The co-design and execution of software on the embedded systems further exacerbate the …

Design of secure and robust cognitive system for malware detection

S Shukla - arXiv preprint arXiv:2208.02310, 2022 - arxiv.org
Machine learning based malware detection techniques rely on grayscale images of malware
and tends to classify malware based on the distribution of textures in graycale images. Albeit …

[PDF][PDF] A Security Framework for Improving QoS by Detecting and Mitigating Cache Side-Channel Attacks in Virtualized Environments

S Mahipal, VC Sharmila - IAENG Int J Comput Sci, 2023 - iaeng.org
Virtualization technology makes cloud resources affordable. Virtual Machines (VMs) are
widely used on top of host machines in cloud computing environments. Adversaries target …

Protecting Data at Risk of Unintentional Electromagnetic Emanation: TEMPEST Profiling

V Antić, D Protić, M Stanković, R Prodanović, M Manić… - Applied Sciences, 2024 - mdpi.com
Unintentional electromagnetic (EM) emissions often include information about the data
processed by electronic devices. Intrusion based on an unintentional EM emission leaves …

A novel malware detection mechanism based on features extracted from converted malware binary images

A Dhavlle, S Shukla - arXiv preprint arXiv:2104.06652, 2021 - arxiv.org
Our computer systems for decades have been threatened by various types of hardware and
software attacks of which Malwares have been one of them. This malware has the ability to …

Special Session: Mitigating Side-channel Attacks through Circuit to Application Layer Approaches

N Kavand, A Darjani, J Trommer, G Galderisi… - Proceedings of the …, 2023 - dl.acm.org
Side-Channel Attacks (SCAs), which are always considered a severe threat to the security of
the cryptographic circuits, today can also be employed to extract IP secrets and neural …