The address sequence on the processor-memory bus can reveal abundant information about the control ow of a program. This can lead to critical information leakage such as encryption keys or proprietary algorithms. Addresses can be observed by attaching a hardware device on the bus that passively monitors the bus transaction. Such side-channel attacks should be given rising attention especially in a distributed computing environment, where remote servers running sensitive programs are not within the physical control of the client. Two previously proposed hardware techniques tackled this problem through randomizing address patterns on the bus. One proposal permutes a set of contiguous memory blocks under certain conditions, while the other app...
sbhatkar,dand,sekar¡ Attacks which exploit memory programming errors (such as buffer overflows) are ...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
Submitted on behalf of EDAA (http://www.edaa.com/)International audienceThe widening spectrum of app...
In this paper, we present MemShuffle, an end-to-end mem-ory protection scheme that resists several a...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
Phase change memory (PCM) is an emerging memory technol-ogy for future computing systems. Compared t...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
International audienceToday's trend in the smart card industry is to move from ROM+EEPROM chips to F...
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valu...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
sbhatkar,dand,sekar¡ Attacks which exploit memory programming errors (such as buffer overflows) are ...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
Submitted on behalf of EDAA (http://www.edaa.com/)International audienceThe widening spectrum of app...
In this paper, we present MemShuffle, an end-to-end mem-ory protection scheme that resists several a...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
XOM-based secure processor has recently been introduced as a mechanism to provide copy and tamper re...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
Phase change memory (PCM) is an emerging memory technol-ogy for future computing systems. Compared t...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
International audienceToday's trend in the smart card industry is to move from ROM+EEPROM chips to F...
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valu...
MasterTo perform sophisticated rowhammer attacks, attackers need to repeatedly access the neighborin...
In recent years, the ability to induce bit-flips in DRAM cells via software-only driven charge deple...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
sbhatkar,dand,sekar¡ Attacks which exploit memory programming errors (such as buffer overflows) are ...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
Submitted on behalf of EDAA (http://www.edaa.com/)International audienceThe widening spectrum of app...