Microarchitecture’s optimizations have increased the performance but lowered the security. Speculative execution is one of the optimizations that was thought to be secure, but it is exploitable to leak information. The problem with these exploits is that there is no easy software defence and many exploits could be unexplored due to it being a fairly recent discovery. This thesis explores a way to find code that is vulnerable to this. The solution to the problem is to use the tool Side Channel Abstract Model Validator (SCAMV) which implements the method Model-Based Testing (MBT). We examine the core CVA6, which is a RISCV Central Processing Unit (CPU). Test cases are generated by program generators and interesting ones are selected by applyi...
Developers of high-security systems (e.g., cryptographic libraries, web browsers) mustnot allow sens...
Side channel attacks are a prominent threat to the security of embedded systems. To perform them, an...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Microarchitecture’s optimizations have increased the performance but lowered the security. Speculati...
Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing conf...
Since the advent of the modern microprocessor, the pursuit of better performance has led to increase...
Cryptography is the foundation of modern IT security,it provides algorithms and protocols that can b...
Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quan...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
Nyligen har stora framsteg gjorts i att tillämpa djupinlärning på sidokanalat- tacker. Detta medför ...
Recent research has uncovered a broad class of security vulnerabilities in which confidential data i...
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a process...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Side-channel attacks are performed on increasingly complex targets, starting to threaten superscalar...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
Developers of high-security systems (e.g., cryptographic libraries, web browsers) mustnot allow sens...
Side channel attacks are a prominent threat to the security of embedded systems. To perform them, an...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Microarchitecture’s optimizations have increased the performance but lowered the security. Speculati...
Though modern microprocessors embed several hardware security mechanisms, aimed at guaranteeing conf...
Since the advent of the modern microprocessor, the pursuit of better performance has led to increase...
Cryptography is the foundation of modern IT security,it provides algorithms and protocols that can b...
Many public-key cryptosystems currently in use are threatened by the possibility of large-scale quan...
The complexity of modern processor architectures has given rise to sophisticated interactions among ...
Nyligen har stora framsteg gjorts i att tillämpa djupinlärning på sidokanalat- tacker. Detta medför ...
Recent research has uncovered a broad class of security vulnerabilities in which confidential data i...
Side Channel Analysis (SCA) is a method by which an adversary can gather information about a process...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Side-channel attacks are performed on increasingly complex targets, starting to threaten superscalar...
The security of modern embedded systems has been the subject of intensive research in engineering ar...
Developers of high-security systems (e.g., cryptographic libraries, web browsers) mustnot allow sens...
Side channel attacks are a prominent threat to the security of embedded systems. To perform them, an...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...