AbstractTo combat the problem of encryption key recovery from main memory using cold boot-attacks, various solutions has been suggested, but most of these have been implemented on the x86 architecture, which is not prevalent in the smartphone market, where instead ARM dominates.One existing solution does exist for the ARM architecture but it is limited to key sizes of 128 bits due to not being able to utilise the full width of the CPU registers used for key storage. We developed a test-implementation of CPU-bound key storage with 256-bit capacity, without using more hardware resources than the previous solution. We also show that access to the key can be restricted for programs executing outside the kernel space
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
To combat the problem of encryption key recovery from main memory using cold boot-attacks, various s...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has been adopted in ...
abstract: The purpose of this project was to implement and analyze a new proposed rootkit that claim...
Abstract—Cold-boot attacks exploit the fact that DRAM contents are not immediately lost when a PC is...
We present Freeze & Crypt, a framework for main memory encryption. Our goal is to protect sensitive ...
The CPU cache is a hardware element that leaks significant information about the software running on...
The CPU cache is a hardware element that leaks significant information about the software running on...
Attacks on memory, revealing secrets, for example, via DMA or cold boot, are a long known problem. I...
As lightweight embedded devices become increasingly ubiquitous and connected, they present a disturb...
The report describes the development of several software side-channel attacks which exploit cache v...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...
To combat the problem of encryption key recovery from main memory using cold boot-attacks, various s...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has been adopted in ...
abstract: The purpose of this project was to implement and analyze a new proposed rootkit that claim...
Abstract—Cold-boot attacks exploit the fact that DRAM contents are not immediately lost when a PC is...
We present Freeze & Crypt, a framework for main memory encryption. Our goal is to protect sensitive ...
The CPU cache is a hardware element that leaks significant information about the software running on...
The CPU cache is a hardware element that leaks significant information about the software running on...
Attacks on memory, revealing secrets, for example, via DMA or cold boot, are a long known problem. I...
As lightweight embedded devices become increasingly ubiquitous and connected, they present a disturb...
The report describes the development of several software side-channel attacks which exploit cache v...
Due to the widespread software piracy and virus attacks, significant efforts have been made to impro...
Abstract—Unencrypted data appearing on the processor– memory bus can result in security violations, ...
In the last 10 years, cache attacks on Intel x86 CPUs have gained increasing attention among the sci...