Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

A survey of timing channels and countermeasures

AK Biswas, D Ghosal, S Nagaraja - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …

Design and implementation of a dynamic information flow tracking architecture to secure a RISC-V core for IoT applications

C Palmiero, G Di Guglielmo, L Lavagno… - 2018 IEEE High …, 2018 - ieeexplore.ieee.org
Security for Internet-of-Things devices is an increasingly critical aspect of computer
architecture, with implications that spread across a wide range of domains. We present the …

Cyclone: Detecting contention-based cache information leaks through cyclic interference

A Harris, S Wei, P Sahu, P Kumar, T Austin… - Proceedings of the 52nd …, 2019 - dl.acm.org
Micro-architecture units like caches are notorious for leaking secrets across security
domains. An attacker program can contend for on-chip state or bandwidth and can even use …

Automatic application of power analysis countermeasures

AG Bayrak, F Regazzoni, D Novo… - IEEE Transactions …, 2013 - ieeexplore.ieee.org
We introduce a compiler that automatically inserts software countermeasures to protect
cryptographic algorithms against power-based side-channel attacks. The compiler first …

Physical protection of lattice-based cryptography: Challenges and solutions

A Khalid, T Oder, F Valencia, M O'Neill… - Proceedings of the …, 2018 - dl.acm.org
The impending realization of scalable quantum computers will have a significant impact on
today's security infrastructure. With the advent of powerful quantum computers public key …

Secure design flow of FPGA based RISC-V implementation

AS Siddiqui, G Shirley, S Bendre… - 2019 IEEE 4th …, 2019 - ieeexplore.ieee.org
In the process of globalization, heterogeneous SoCs play an important role in an embedded
application, security aspects of such a system are crucial. The system is susceptible to many …

Reliable integrity checking in multicore processors

A Kanuparthi, R Karri - ACM Transactions on Architecture and Code …, 2015 - dl.acm.org
Security and reliability have become important concerns in the design of computer systems.
On one hand, microarchitectural enhancements for security (such as for dynamic integrity …

Towards microarchitectural side-channel security for modern applications—a case for many-domain processors

S Wei - 2024 - repositories.lib.utexas.edu
Modern applications often host or process code and data from many mutually distrusted
entities referred to as security domains. Ensuring the data privacy and security of these …

[PDF][PDF] Methods for Trustworthy Design of On-Chip Bus Interconnect for General-Purpose Processors

JF Elson - 2012 - core.ac.uk
Military electronics rely on commodity processors, many of which are manufactured
overseas where the trustworthiness of the foundries is uncertain. This thesis attempts to …