In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valuable element to protect against information theft. Many first-order side-channel attacks have been reported on all its components from the main memory to the CPU registers. In this context, memory hierarchy encryption is widely used to ensure data confidentiality. Yet, this solution suffers from both memory and area overhead along with performance losses (timing delays), which is especially critical for cache memories that already occupy a large part of the spatial footprint of a processor. In this paper, we propose a secure and lightweight scheme to ensure the data confidentiality through the whole memory hierarchy. This is done by masking t...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
The address sequence on the processor-memory bus can reveal abundant information about the control o...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Side-channel attacks constitute a concrete threat to IoT systems-on-a-chip (SoCs). Embedded memories...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
In this paper, we present MemShuffle, an end-to-end mem-ory protection scheme that resists several a...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Over past few decades, various ways have been conducted through side channel attacks to steal inform...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
The address sequence on the processor-memory bus can reveal abundant information about the control o...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...
International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is consider...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
Side-channel attacks constitute a concrete threat to IoT systems-on-a-chip (SoCs). Embedded memories...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
In this paper, we present MemShuffle, an end-to-end mem-ory protection scheme that resists several a...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Over past few decades, various ways have been conducted through side channel attacks to steal inform...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
The address sequence on the processor-memory bus can reveal abundant information about the control o...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...