Digital twin: A comprehensive survey of security threats
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
Spectre attacks: Exploiting speculative execution
Modern processors use branch prediction and speculative execution to maximize
performance. For example, if the destination of a branch depends on a memory value that is …
performance. For example, if the destination of a branch depends on a memory value that is …
Memguard: Defending against black-box membership inference attacks via adversarial examples
In a membership inference attack, an attacker aims to infer whether a data sample is in a
target classifier's training dataset or not. Specifically, given a black-box access to the target …
target classifier's training dataset or not. Specifically, given a black-box access to the target …
Software grand exposure:{SGX} cache attacks are practical
Intel SGX isolates the memory of security-critical applications from the untrusted OS.
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution
Speculative execution side-channel vulnerabilities in micro-architecture processors have
raised concerns about the security of Intel SGX. To understand clearly the security impact of …
raised concerns about the security of Intel SGX. To understand clearly the security impact of …
Cloud security issues and challenges: A survey
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …
amount of virtual storage. The main features of cloud computing is that the user does not …
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
Last-level cache side-channel attacks are practical
We present an effective implementation of the Prime+ Probe side-channel attack against the
last-level cache. We measure the capacity of the covert channel the attack creates and …
last-level cache. We measure the capacity of the covert channel the attack creates and …
Malware guard extension: Using SGX to conceal cache attacks
In modern computer systems, user processes are isolated from each other by the operating
system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor …
system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor …