An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution

G Chen, S Chen, Y **
MK Qureshi - 2018 51st Annual IEEE/ACM International …, 2018 - ieeexplore.ieee.org
Modern processors share the last-level cache between all the cores to efficiently utilize the
cache space. Unfortunately, such sharing makes the cache vulnerable to attacks whereby …