PLATYPUS: Software-based power side-channel attacks on x86

M Lipp, A Kogler, D Oswald, M Schwarz… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …

{AMD} prefetch attacks through power and time

M Lipp, D Gruss, M Schwarz - 31st USENIX Security Symposium …, 2022 - usenix.org
Modern operating systems fundamentally rely on the strict isolation of user applications from
the kernel. This isolation is enforced by the hardware. On Intel CPUs, this isolation has been …

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis

C Shepherd, K Markantonakis, N Van Heijningen… - Computers & …, 2021 - Elsevier
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …

Power-based side-channel instruction-level disassembler

J Park, X Xu, Y **, D Forte, M Tehranipoor - Proceedings of the 55th …, 2018 - dl.acm.org
Modern embedded computing devices are vulnerable against malware and software piracy
due to insufficient security scrutiny and the complications of continuous patching. To detect …

Scandalee: a side-channel-based disassembler using local electromagnetic emanations

D Strobel, F Bache, D Oswald… - … , Automation & Test …, 2015 - ieeexplore.ieee.org
Side-channel analysis has become a well-established topic in the scientific community and
industry over the last one and a half decade. Somewhat surprisingly, the vast majority of …

REMOTE: Robust external malware detection framework by using electromagnetic signals

N Sehatbakhsh, A Nazari, M Alam… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are controlling many critical and sensitive aspects of our
physical world while being continuously exposed to potential cyber-attacks. These systems …

Real-time instruction-level verification of remote IoT/CPS devices via side channels

Y Bai, J Park, M Tehranipoor, D Forte - Discover Internet of Things, 2022 - Springer
In recent years, with the rise of IoT technology, wireless Cyber-Physical Systems (CPS) have
become widely deployed in critical infrastructure, including power generation, military …

Zero-overhead profiling via em emanations

R Callan, F Behrang, A Zajic, M Prvulovic… - Proceedings of the 25th …, 2016 - dl.acm.org
This paper presents an approach for zero-overhead profiling (ZOP). ZOP accomplishes
accurate program profiling with no modification to the program or system during profiling and …

[PDF][PDF] Anatomy of attacks on IoT systems: review of attacks, impacts and countermeasures

M Msgna - J. Surv. Secur. Saf, 2022 - f.oaes.cc
Abstract Aim: The Internet of Things is a disruptive technology that converts physical objects
into a constant source of information. Internet-connected devices bridge the gap between …

Leveraging side-channel information for disassembly and security

J Park, F Rahman, A Vassilev, D Forte… - ACM Journal on …, 2019 - dl.acm.org
With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical
devices, smart home appliances, as well as traditional computing platforms such as …