Physical side-channel monitoring leverages the physical phenomena produced by a microcontroller (e.g. power con- sumption or electromagnetic radiation) to monitor program execution for malicious behavior. As such, it offers a promis- ing intrusion detection solution for resource-constrained em- bedded systems, which are incompatible with conventional security measures. This method is especially relevant in safety and security-critical embedded systems such as in industrial control systems. Side-channel monitoring poses unique chal- lenges for would-be attackers, such as: (1) limiting attack vectors by being physically isolated from the monitored sys- tem, (2) monitoring immutable physical side channels with uninterpretable data-...
Hardware Trojans have gained high attention in academia, industry and by government agencies. The ef...
Trustworthy operation of control systems and critical infrastructures, such as industrial control sy...
Security and privacy in computer systems is becoming an ever important field of study as the informa...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
Side-channel attacks have become a very important and well-studied area in computer security. Tradit...
The physical state of a system is affected by the activities and processes in which it is tasked wit...
Cybersecurity continues to be a difficult issue for society especially as the number of networked sy...
Abstract Since the introduction of the first side-channel analyses in academia about 15 years ago, s...
This decade has already seen a significant surge in the number of cyber attacks. With the exponentia...
We introduce new methods for detecting control-flow side channel attacks, transforming C source code...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
With the Internet-of-Things revolution, the security assessment against implementation attacks has ...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Doctor of PhilosophyDepartment of Computing and Information SciencesEugene VassermanChecking softwar...
International audienceA Trusted Execution Environment (TEE) is a software solution made to improve s...
Hardware Trojans have gained high attention in academia, industry and by government agencies. The ef...
Trustworthy operation of control systems and critical infrastructures, such as industrial control sy...
Security and privacy in computer systems is becoming an ever important field of study as the informa...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
Side-channel attacks have become a very important and well-studied area in computer security. Tradit...
The physical state of a system is affected by the activities and processes in which it is tasked wit...
Cybersecurity continues to be a difficult issue for society especially as the number of networked sy...
Abstract Since the introduction of the first side-channel analyses in academia about 15 years ago, s...
This decade has already seen a significant surge in the number of cyber attacks. With the exponentia...
We introduce new methods for detecting control-flow side channel attacks, transforming C source code...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
With the Internet-of-Things revolution, the security assessment against implementation attacks has ...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
Doctor of PhilosophyDepartment of Computing and Information SciencesEugene VassermanChecking softwar...
International audienceA Trusted Execution Environment (TEE) is a software solution made to improve s...
Hardware Trojans have gained high attention in academia, industry and by government agencies. The ef...
Trustworthy operation of control systems and critical infrastructures, such as industrial control sy...
Security and privacy in computer systems is becoming an ever important field of study as the informa...