[HTML][HTML] Research communities in cyber security vulnerability assessments: A comprehensive literature review

F Heiding, S Katsikeas, R Lagerström - Computer Science Review, 2023 - Elsevier
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic
fields of study. Still, it is sometimes unclear what research areas are included in the …

Automated software protection for the masses against side-channel attacks

N Belleville, D Couroussé, K Heydemann… - ACM Transactions on …, 2018 - dl.acm.org
We present an approach and a tool to answer the need for effective, generic, and easily
applicable protections against side-channel attacks. The protection mechanism is based on …

Side-channel security of superscalar CPUs: evaluating the impact of micro-architectural features

A Barenghi, G Pelosi - Proceedings of the 55th Annual Design …, 2018 - dl.acm.org
Side-channel attacks are performed on increasingly complex targets, starting to threaten
superscalar CPUs supporting a complete operating system. The difficulty of both assessing …

Crow: Code diversification for webassembly

JC Arteaga, O Malivitsis, OV Perez, B Baudry… - arxiv preprint arxiv …, 2020 - arxiv.org
The adoption of WebAssembly has rapidly increased in the last few years as it provides a
fast and safe model for program execution. However, WebAssembly is not exempt from …

Deep Learning Side-Channel Analysis on Large-Scale Traces: A Case Study on a Polymorphic AES

L Masure, N Belleville, E Cagli, MA Cornelie… - … on Research in …, 2020 - Springer
Code polymorphism is an approach to efficiently address the challenge of automatically
applying the hiding of sensitive information leakage, as a way to protect cryptographic …

Runtime code polymorphism as a protection against side channel attacks

D Couroussé, T Barry, B Robisson, P Jaillon… - … on Information Security …, 2016 - Springer
We present a generic framework for runtime code polymorphism, applicable to a broad
range of computing platforms including embedded systems with low computing resources …

Modified hardware security algorithms for process industries using internet of things

JS Prasath, U Ramachandraiah… - Journal of Applied …, 2021 - Taylor & Francis
Embedded devices used in process industries are vulnerable to a variety of attacks due to its
large number of deployments to reduce the measurement and process complexity. The …

Metis: An integrated morphing engine CPU to protect against side channel attacks

F Antognazza, A Barenghi, G Pelosi - IEEE Access, 2021 - ieeexplore.ieee.org
Power consumption and electromagnetic emissions analyses are well established attack
avenues for secret values extraction in a large range of embedded devices …

Combining loop shuffling and code polymorphism for enhanced AES side-channel security

N Belleville, L Masure - … Workshop on Constructive Side-Channel Analysis …, 2024 - Springer
Combining countermeasures against side-channel attacks represents a promising approach
to defend against powerful attackers. Existing works on this topic show that the hope for a …

A comprehensive side-channel information leakage analysis of an in-order RISC CPU microarchitecture

D Zoni, A Barenghi, G Pelosi, W Fornaciari - ACM Transactions on …, 2018 - dl.acm.org
Side-channel attacks are a prominent threat to the security of embedded systems. To
perform them, an adversary evaluates the goodness of fit of a set of key-dependent power …