Systematic classification of side-channel attacks: A case study for mobile devices

R Spreitzer, V Moonsamy, T Korak… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Side-channel attacks on mobile devices have gained increasing attention since their
introduction in 2007. While traditional side-channel attacks, such as power analysis attacks …

A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics

A Sayakkara, NA Le-Khac, M Scanlon - Digital Investigation, 2019 - Elsevier
The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their
pertinence to digital forensic investigations will increase into the foreseeable future. These …

Hertzbleed: Turning power {Side-Channel} attacks into remote timing attacks on x86

Y Wang, R Paccagnella, ET He, H Shacham… - 31st USENIX Security …, 2022 - usenix.org
Power side-channel attacks exploit data-dependent variations in a CPU's power
consumption to leak secrets. In this paper, we show that on modern Intel (and AMD) x86 …

Spectre attacks: Exploiting speculative execution

P Kocher, J Horn, A Fogh, D Genkin, D Gruss… - Communications of the …, 2020 - dl.acm.org
Modern processors use branch prediction and speculative execution to maximize
performance. For example, if the destination of a branch depends on a memory value that is …

Port contention for fun and profit

AC Aldaya, BB Brumley, S ul Hassan… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Simultaneous Multithreading (SMT) architectures are attractive targets for side-channel
enabled attackers, with their inherently broader attack surface that exposes more per …

[หนังสือ][B] Singular spectrum analysis with R

Singular spectrum analysis (SSA) is a well-known methodology for analysis and forecasting
of time series. Since quite recently, SSA was also used to analyze digital images and other …

[PDF][PDF] ASLR on the Line: Practical Cache Attacks on the MMU.

B Gras, K Razavi, E Bosman, H Bos, C Giuffrida - NDSS, 2017 - hydra.azilian.net
Address space layout randomization (ASLR) is an important first line of defense against
memory corruption attacks and a building block for many modern countermeasures. Existing …

Recovering fingerprints from in-display fingerprint sensors via electromagnetic side channel

T Ni, X Zhang, Q Zhao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Recently, in-display fingerprint sensors have been widely adopted in newly-released
smartphones. However, we find this new technique can leak information about the user's …

Hot pixels: Frequency, power, and temperature attacks on {GPUs} and arm {SoCs}

H Taneja, J Kim, JJ Xu, S Van Schaik… - 32nd USENIX Security …, 2023 - usenix.org
The drive to create thinner, lighter, and more energy efficient devices has resulted in modern
SoCs being forced to balance a delicate tradeoff between power consumption, heat …

Secure and lightweight conditional privacy-preserving authentication for securing traffic emergency messages in VANETs

L Wei, J Cui, Y Xu, J Cheng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Owing to the development of wireless communication technology and the increasing
number of automobiles, vehicular ad hoc networks (VANETs) have become essential tools …