A survey on machine-learning based security design for cyber-physical systems

S Kim, KJ Park - Applied Sciences, 2021 - mdpi.com
A cyber-physical system (CPS) is the integration of a physical system into the real world and
control applications in a computing system, interacting through a communications network …

Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA

M Mushtaq, MA Mukhtar, V Lapotre, MK Bhatti… - Information Systems, 2020 - Elsevier
Timing-based side-channels play an important role in exposing the state of a process
execution on underlying hardware by revealing information about timing and access …

WHISPER: A tool for run-time detection of side-channel attacks

M Mushtaq, J Bricq, MK Bhatti, A Akram… - IEEE …, 2020 - ieeexplore.ieee.org
High resolution and stealthy attacks and their variants such as Flush+ Reload, Flush+ Flush,
Prime+ Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel's …

A survey on hardware vulnerability analysis using machine learning

Z Pan, P Mishra - IEEE Access, 2022 - ieeexplore.ieee.org
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …

Sok: Can we really detect cache side-channel attacks by monitoring performance counters?

W Kosasih, Y Feng, C Chuengsatiansup… - Proceedings of the 19th …, 2024 - dl.acm.org
Sharing microarchitectural components between co-resident programs leads to potential
information leaks, with devastating implications on security. Over the last decade, multiple …

Real time detection of spectre and meltdown attacks using machine learning

BA Ahmad - arxiv preprint arxiv:2006.01442, 2020 - arxiv.org
Recently discovered Spectre and meltdown attacks affects almost all processors by leaking
confidential information to other processes through side-channel attacks. These …

Meet the Sherlock Holmes' of side channel leakage: A survey of cache SCA detection techniques

A Akram, M Mushtaq, MK Bhatti, V Lapotre… - IEEE …, 2020 - ieeexplore.ieee.org
Cache Side Channel Attacks (SCAs) have gained a lot of attention in the recent past. Since,
these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous …

Deep learning based detection for multiple cache side-channel attacks

H Kim, C Hahn, HJ Kim, Y Shin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
A cache side-channel attack retrieves victim's sensitive information from a system by
exploiting shared cache of CPUs. Since conventional cache side-channel attacks such as …

Toward an Optimal Countermeasure for Cache Side-Channel Attacks

N Shrivastava, SR Sarangi - IEEE Embedded Systems Letters, 2022 - ieeexplore.ieee.org
In the last 15 years, we have witnessed a never-ending arm's race between the attacker and
the defender with respect to cache-based side-channel attacks. We have seen a slew of …

Neuromorphic-enabled security for IoT

S Salehi, T Sheaves, KI Gubbi… - 2022 20th IEEE …, 2022 - ieeexplore.ieee.org
Hardware attacks on resource-constrained IoT devices are evolving rapidly. These threats
have become a significant concern due to the increase of IoT devices used in applications …