A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

An overview of cyber-resilient smart inverters based on practical attack models

BH Ahn, T Kim, S Ahmad, SK Mazumder… - … on Power Electronics, 2023 - ieeexplore.ieee.org
With high penetration of distributed energy resources (DERs), power systems are
increasingly transforming into distributed power grids, which provide grid automation …

Fuzzing hardware like software

T Trippel, KG Shin, A Chernyakhovsky, G Kelly… - 31st USENIX Security …, 2022 - usenix.org
Hardware flaws are permanent and potent: hardware cannot be patched once fabricated,
and any flaws may undermine even formally verified software executing on top …

Jolt: Recovering tls signing keys via rowhammer faults

K Mus, Y Doröz, MC Tol, K Rahman… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Digital Signature Schemes such as DSA, ECDSA, and RSA are widely deployed to protect
the integrity of security protocols such as TLS, SSH, and IPSec. In TLS, for instance, RSA …

With a little help from my friends: Constructing practical anonymous credentials

L Hanzlik, D Slamanig - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …

{CopyCat}: Controlled {Instruction-Level} attacks on enclaves

D Moghimi, J Van Bulck, N Heninger… - 29th USENIX security …, 2020 - usenix.org
The adversarial model presented by trusted execution environments (TEEs) has prompted
researchers to investigate unusual attack vectors. One particularly powerful class of …

Don't reject this: Key-recovery timing attacks due to rejection-sampling in HQC and BIKE

Q Guo, C Hlauschek, T Johansson, N Lahr… - IACR Transactions on …, 2022 - tches.iacr.org
Well before large-scale quantum computers will be available, traditional cryptosystems must
be transitioned to post-quantum (PQ) secure schemes. The NIST PQC competition aims to …

Minerva: The curse of ECDSA nonces: Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces

J Jancar, V Sedlacek, P Svenda, M Sys - IACR Transactions on …, 2020 - tches.iacr.org
We present our discovery of a group of side-channel vulnerabilities in implementations of
the ECDSA signature algorithm in a widely used Atmel AT90SC FIPS 140-2 certified …

Verifying hardware security modules with {Information-Preserving} refinement

A Athalye, MF Kaashoek, N Zeldovich - 16th USENIX Symposium on …, 2022 - usenix.org
Verifying Hardware Security Modules with Information-Preserving Refinement Page 1 This paper
is included in the Proceedings of the 16th USENIX Symposium on Operating Systems Design and …

[HTML][HTML] Evaluating the applicability of hardware trust anchors for automotive applications

C Plappert, D Lorych, M Eckel, L Jäger, A Fuchs… - Computers & …, 2023 - Elsevier
The automotive trend towards autonomous driving and advanced connected services
increases both complexity of the vehicle internal network and the connections to its …