A survey on machine-learning based security design for cyber-physical systems
A cyber-physical system (CPS) is the integration of a physical system into the real world and
control applications in a computing system, interacting through a communications network …
control applications in a computing system, interacting through a communications network …
Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
Timing-based side-channels play an important role in exposing the state of a process
execution on underlying hardware by revealing information about timing and access …
execution on underlying hardware by revealing information about timing and access …
WHISPER: A tool for run-time detection of side-channel attacks
High resolution and stealthy attacks and their variants such as Flush+ Reload, Flush+ Flush,
Prime+ Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel's …
Prime+ Probe, Spectre and Meltdown have completely exposed the vulnerabilities in Intel's …
A survey on hardware vulnerability analysis using machine learning
Electronic systems rely on efficient hardware, popularly known as system-on-chip (SoC), to
support its core functionalities. A typical SoC consists of diverse components gathered from …
support its core functionalities. A typical SoC consists of diverse components gathered from …
Sok: Can we really detect cache side-channel attacks by monitoring performance counters?
W Kosasih, Y Feng, C Chuengsatiansup… - Proceedings of the 19th …, 2024 - dl.acm.org
Sharing microarchitectural components between co-resident programs leads to potential
information leaks, with devastating implications on security. Over the last decade, multiple …
information leaks, with devastating implications on security. Over the last decade, multiple …
Real time detection of spectre and meltdown attacks using machine learning
BA Ahmad - arxiv preprint arxiv:2006.01442, 2020 - arxiv.org
Recently discovered Spectre and meltdown attacks affects almost all processors by leaking
confidential information to other processes through side-channel attacks. These …
confidential information to other processes through side-channel attacks. These …
Meet the Sherlock Holmes' of side channel leakage: A survey of cache SCA detection techniques
Cache Side Channel Attacks (SCAs) have gained a lot of attention in the recent past. Since,
these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous …
these attacks exploit the caching hardware vulnerabilities, they are fast and dangerous …
Deep learning based detection for multiple cache side-channel attacks
A cache side-channel attack retrieves victim's sensitive information from a system by
exploiting shared cache of CPUs. Since conventional cache side-channel attacks such as …
exploiting shared cache of CPUs. Since conventional cache side-channel attacks such as …
Toward an Optimal Countermeasure for Cache Side-Channel Attacks
In the last 15 years, we have witnessed a never-ending arm's race between the attacker and
the defender with respect to cache-based side-channel attacks. We have seen a slew of …
the defender with respect to cache-based side-channel attacks. We have seen a slew of …
Neuromorphic-enabled security for IoT
Hardware attacks on resource-constrained IoT devices are evolving rapidly. These threats
have become a significant concern due to the increase of IoT devices used in applications …
have become a significant concern due to the increase of IoT devices used in applications …