PLATYPUS: Software-based power side-channel attacks on x86
Power side-channel attacks exploit variations in power consumption to extract secrets from a
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …
device, eg, cryptographic keys. Prior attacks typically required physical access to the target …
{AMD} prefetch attacks through power and time
Modern operating systems fundamentally rely on the strict isolation of user applications from
the kernel. This isolation is enforced by the hardware. On Intel CPUs, this isolation has been …
the kernel. This isolation is enforced by the hardware. On Intel CPUs, this isolation has been …
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core,
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
high-frequency CPUs and complex pipelines. In parallel, sophisticated SoC-assisted …
Power-based side-channel instruction-level disassembler
Modern embedded computing devices are vulnerable against malware and software piracy
due to insufficient security scrutiny and the complications of continuous patching. To detect …
due to insufficient security scrutiny and the complications of continuous patching. To detect …
Scandalee: a side-channel-based disassembler using local electromagnetic emanations
D Strobel, F Bache, D Oswald… - … , Automation & Test …, 2015 - ieeexplore.ieee.org
Side-channel analysis has become a well-established topic in the scientific community and
industry over the last one and a half decade. Somewhat surprisingly, the vast majority of …
industry over the last one and a half decade. Somewhat surprisingly, the vast majority of …
REMOTE: Robust external malware detection framework by using electromagnetic signals
Cyber-physical systems (CPS) are controlling many critical and sensitive aspects of our
physical world while being continuously exposed to potential cyber-attacks. These systems …
physical world while being continuously exposed to potential cyber-attacks. These systems …
Real-time instruction-level verification of remote IoT/CPS devices via side channels
In recent years, with the rise of IoT technology, wireless Cyber-Physical Systems (CPS) have
become widely deployed in critical infrastructure, including power generation, military …
become widely deployed in critical infrastructure, including power generation, military …
Zero-overhead profiling via em emanations
This paper presents an approach for zero-overhead profiling (ZOP). ZOP accomplishes
accurate program profiling with no modification to the program or system during profiling and …
accurate program profiling with no modification to the program or system during profiling and …
[PDF][PDF] Anatomy of attacks on IoT systems: review of attacks, impacts and countermeasures
M Msgna - J. Surv. Secur. Saf, 2022 - f.oaes.cc
Abstract Aim: The Internet of Things is a disruptive technology that converts physical objects
into a constant source of information. Internet-connected devices bridge the gap between …
into a constant source of information. Internet-connected devices bridge the gap between …
Leveraging side-channel information for disassembly and security
With the rise of Internet of Things (IoT), devices such as smartphones, embedded medical
devices, smart home appliances, as well as traditional computing platforms such as …
devices, smart home appliances, as well as traditional computing platforms such as …