As Moore`s law continues to reduce the cost of computation at an exponential rate, embedded computing capabilities spread to ever-expanding application scenarios, such as smartphones, the Internet of Things, and automation, among many others. This trend has naturally caused the underlying technology to evolve and has introduced increasingly complex microarchitectures into embedded processors in attempts to optimize for performance. While other microarchitectures, like those used in personal computers, have been extensively studied, there has been relatively less research done on embedded microarchitectures. This is especially true in terms of their security, which is growing more important as widespread adoption increases. This thesis explo...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The ongoing miniaturization of semiconductor manufacturing technologies has enabled the integration ...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has been adopted in ...
abstract: With the rise of the Internet of Things, embedded systems have become an integral part of ...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
Cache attacks are known to be sophisticated attacks against cryptographic implementations on desktop...
This paper proposes the first cache timing side-channel attack on one of Apple’s mobile devices. Uti...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
As computer systems grow more and more complicated, various optimizations can unintentionally introd...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The ongoing miniaturization of semiconductor manufacturing technologies has enabled the integration ...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Recognizing the pressing demands to secure embedded applications, ARM TrustZone has been adopted in ...
abstract: With the rise of the Internet of Things, embedded systems have become an integral part of ...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
Cache attacks are known to be sophisticated attacks against cryptographic implementations on desktop...
This paper proposes the first cache timing side-channel attack on one of Apple’s mobile devices. Uti...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
As computer systems grow more and more complicated, various optimizations can unintentionally introd...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Software side channel attacks have become a serious concern with the recent rash of attacks on specu...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The ongoing miniaturization of semiconductor manufacturing technologies has enabled the integration ...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...