An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

A survey of microarchitectural timing attacks and countermeasures on contemporary hardware

Q Ge, Y Yarom, D Cock, G Heiser - Journal of Cryptographic Engineering, 2018 - Springer
Microarchitectural timing channels expose hidden hardware states though timing. We survey
recent attacks that exploit microarchitectural features in shared hardware, especially as they …

Ryoan: A distributed sandbox for untrusted computation on secret data

T Hunt, Z Zhu, Y Xu, S Peter, E Witchel - ACM Transactions on Computer …, 2018 - dl.acm.org
Users of modern data-processing services such as tax preparation or genomic screening
are forced to trust them with data that the users wish to keep secret. Ryoan1 protects secret …

Cacheaudit: A tool for the static analysis of cache side channels

G Doychev, B Köpf, L Mauborgne… - ACM Transactions on …, 2015 - dl.acm.org
We present CacheAudit, a versatile framework for the automatic, static analysis of cache
side channels. CacheAudit takes as input a program binary and a cache configuration and …

A hardware design language for timing-sensitive information-flow security

D Zhang, Y Wang, GE Suh, AC Myers - Acm Sigplan Notices, 2015 - dl.acm.org
Information security can be compromised by leakage via low-level hardware features. One
recently prominent example is cache probing attacks, which rely on timing channels created …

Register transfer level information flow tracking for provably secure hardware design

A Ardeshiricham, W Hu, J Marxen… - Design, Automation & …, 2017 - ieeexplore.ieee.org
Information Flow Tracking (IFT) provides a formal methodology for modeling and reasoning
about security properties related to integrity, confidentiality, and logical side channel …

Analysis of the communication between colluding applications on modern smartphones

C Marforio, H Ritzdorf, A Francillon… - Proceedings of the 28th …, 2012 - dl.acm.org
Modern smartphones that implement permission-based security mechanisms suffer from
attacks by colluding applications. Users are not made aware of possible implications of …

Sapper: A language for hardware-level security policy enforcement

X Li, V Kashyap, JK Oberg, M Tiwari… - Proceedings of the 19th …, 2014 - dl.acm.org
Privacy and integrity are important security concerns. These concerns are addressed by
controlling information flow, ie, restricting how information can flow through a system. Most …

SurfNoC: A low latency and provably non-interfering approach to secure networks-on-chip

HMG Wassel, Y Gao, JK Oberg, T Huffmire… - ACM SIGARCH …, 2013 - dl.acm.org
As multicore processors find increasing adoption in domains such as aerospace and
medical devices where failures have the potential to be catastrophic, strong performance …