Covert channel communication as an emerging security threat in 2.5 d/3d integrated systems
In this paper, first, a broad overview of existing covert channel communication-based
security attacks is provided. Such covert channels establish a communication link between …
security attacks is provided. Such covert channels establish a communication link between …
High bandwidth thermal covert channel in 3-d-integrated multicore processors
Exploiting thermal coupling among the cores of a processor to secretly communicate
sensitive information is a serious threat in mobile, desktop, and server platforms. Existing …
sensitive information is a serious threat in mobile, desktop, and server platforms. Existing …
Balancing Security and Efficiency: System-Informed Mitigation of Power-Based Covert Channels
As the digital landscape continues to evolve, the security of computing systems has become
a critical concern. Power-based covert channels (eg, thermal covert channel s (TCCs)), a …
a critical concern. Power-based covert channels (eg, thermal covert channel s (TCCs)), a …
Information-theoretic perspective to thermal covert channels
Covert communication channels are a significant security threat where the host computer's
security policy is bypassed to establish a communication link that can leak sensitive data …
security policy is bypassed to establish a communication link that can leak sensitive data …
Combating Stealthy Thermal Covert Channel Attack With Its Thermal Signal Transmitted in Direct Sequence Spread Spectrum
X Wang, S Wang, Y Jiang, AK Singh… - … on Computer-Aided …, 2022 - ieeexplore.ieee.org
Many-core systems are susceptible to attacks launched by thermal covert channel (TCC)
attacks. Detection of TCC attacks often relies on the use of threshold-based approaches or …
attacks. Detection of TCC attacks often relies on the use of threshold-based approaches or …
MeMoir: A Software-Driven Covert Channel based on Memory Usage
Covert channel attacks have been continuously studied as severe threats to modern
computing systems. Software-based covert channels are a typically hard-to-detect branch of …
computing systems. Software-based covert channels are a typically hard-to-detect branch of …
Enhanced Detection of Thermal Covert Channel Attacks in Multicore Processors
Information leakage through temperature based covert channels is a growing threat in
modern multicore processors. Thus, accurately detecting the presence of such thermal …
modern multicore processors. Thus, accurately detecting the presence of such thermal …
Detecting and Mitigating Hardware Security Attacks in Emerging Technologies and Applications
K Dhananjay - 2022 - search.proquest.com
Starting from the famous Van Eck Phreaking attack (performed in 1985) that picks up
electromagnetic emissions for spying on a computing device to the more recent Spectre and …
electromagnetic emissions for spying on a computing device to the more recent Spectre and …
Detection and Defense Against Thermal and Timing Covert Channel Attacks in Multi-Core Systems
As interest in multi-core systems grows, so does the potential for information leakage
throughcovert channel communication. Covert channel attacks pose a severe threat …
throughcovert channel communication. Covert channel attacks pose a severe threat …