Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
A survey of timing channels and countermeasures
A timing channel is a communication channel that can transfer information to a
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
receiver/decoder by modulating the timing behavior of an entity. Examples of this entity …
Design and implementation of a dynamic information flow tracking architecture to secure a RISC-V core for IoT applications
Security for Internet-of-Things devices is an increasingly critical aspect of computer
architecture, with implications that spread across a wide range of domains. We present the …
architecture, with implications that spread across a wide range of domains. We present the …
Cyclone: Detecting contention-based cache information leaks through cyclic interference
Micro-architecture units like caches are notorious for leaking secrets across security
domains. An attacker program can contend for on-chip state or bandwidth and can even use …
domains. An attacker program can contend for on-chip state or bandwidth and can even use …
Automatic application of power analysis countermeasures
We introduce a compiler that automatically inserts software countermeasures to protect
cryptographic algorithms against power-based side-channel attacks. The compiler first …
cryptographic algorithms against power-based side-channel attacks. The compiler first …
Physical protection of lattice-based cryptography: Challenges and solutions
The impending realization of scalable quantum computers will have a significant impact on
today's security infrastructure. With the advent of powerful quantum computers public key …
today's security infrastructure. With the advent of powerful quantum computers public key …
Secure design flow of FPGA based RISC-V implementation
In the process of globalization, heterogeneous SoCs play an important role in an embedded
application, security aspects of such a system are crucial. The system is susceptible to many …
application, security aspects of such a system are crucial. The system is susceptible to many …
Reliable integrity checking in multicore processors
Security and reliability have become important concerns in the design of computer systems.
On one hand, microarchitectural enhancements for security (such as for dynamic integrity …
On one hand, microarchitectural enhancements for security (such as for dynamic integrity …
Towards microarchitectural side-channel security for modern applications—a case for many-domain processors
S Wei - 2024 - repositories.lib.utexas.edu
Modern applications often host or process code and data from many mutually distrusted
entities referred to as security domains. Ensuring the data privacy and security of these …
entities referred to as security domains. Ensuring the data privacy and security of these …
[PDF][PDF] Methods for Trustworthy Design of On-Chip Bus Interconnect for General-Purpose Processors
JF Elson - 2012 - core.ac.uk
Military electronics rely on commodity processors, many of which are manufactured
overseas where the trustworthiness of the foundries is uncertain. This thesis attempts to …
overseas where the trustworthiness of the foundries is uncertain. This thesis attempts to …