Memory systems security has increased over the last decade due to the sensitive information which is stored in plain text. Device specific attacks, such as cold-boot and sidechannel monitoring have been reported as being successfully in retrieving encryption and private keys from algorithms like AES and RSA. In this paper, we propose a new technique of securing the cache memories by scrambling the stored data that uses interleaved scrambling vectors which reduce the power consumption if compared to the standard scrambling technique. Dissemination rules for the retained data in the cache are employed, in order to make data unusable if retrieved successfully by any type of attack. The proposed technique is analyzed and evaluated from several...
The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Memory systems security has increased over the last decade due to the sensitive information which is...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...
Abstract — Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory ...
Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence i...
Memory remanence in SRAMs and DRAMs is usually exploited through cold-boot attacks and the targets ...
A wide range of attacks that target cache memories in secure systems have been reported in the last ...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valu...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Memory systems security has increased over the last decade due to the sensitive information which is...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...
Abstract — Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory ...
Microprocessor memory is sensitive to cold boot attacks. In this kind of attacks, memory remanence i...
Memory remanence in SRAMs and DRAMs is usually exploited through cold-boot attacks and the targets ...
A wide range of attacks that target cache memories in secure systems have been reported in the last ...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valu...
Crypto-processors are prone to security attacks based on the observation of their power consumption ...
The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware ...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...