With increasing interest in multi-core systems, such as any communication systems, infra-structures can become targets for information leakages via covert channel communication. Covert channel attacks lead to leaking secret information and data. To design countermeasures against these threats, we need to have good knowledge about classes of covert channel attacks along with their properties. Temperature–based covert communication channel, known as Thermal Covert Channel (TCC), can pose a threat to the security of critical information and data. In this paper, we present a novel scheme against such TCC attacks. The scheme adds selective noise to the thermal signal so that any possible TCC attack can be wiped out. The noise addition only happe...
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channe...
Abstract. Temperature effects can be used to maliciously affect the behavior of digital crypto-circu...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
With increasing interest in multi-core systems, such as any communication systems, infra-structures ...
In many-core chips seen in mobile computing, data center, AI, and elsewhere, thermal covert channels...
Many-core systems are susceptible to attacks launched by thermal covert channel (TCC) attacks. Detec...
In response to growing security challenges facing many-core systems imposed by thermal covert channe...
Covert channels aim to hide the existence of communication. Recently, Murdoch proposed a temperature...
Modern multicore processors feature easily accessible temperature sensors that provide useful inform...
Covert channels aim to hide the existence of communication. Recently, Murdoch proposed a temperature...
Covert channels aim to hide the existence of communication. Recently, Murdoch proposed a temperature...
Within a world that increasingly relies on connected devices, security and reliability have become m...
Covert channels aim to hide the existence of communication between two or more parties. Such channel...
Side-channel attacks (SCAs) are powerful attacks that could be used to retrieve keys from electronic...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channe...
Abstract. Temperature effects can be used to maliciously affect the behavior of digital crypto-circu...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
With increasing interest in multi-core systems, such as any communication systems, infra-structures ...
In many-core chips seen in mobile computing, data center, AI, and elsewhere, thermal covert channels...
Many-core systems are susceptible to attacks launched by thermal covert channel (TCC) attacks. Detec...
In response to growing security challenges facing many-core systems imposed by thermal covert channe...
Covert channels aim to hide the existence of communication. Recently, Murdoch proposed a temperature...
Modern multicore processors feature easily accessible temperature sensors that provide useful inform...
Covert channels aim to hide the existence of communication. Recently, Murdoch proposed a temperature...
Covert channels aim to hide the existence of communication. Recently, Murdoch proposed a temperature...
Within a world that increasingly relies on connected devices, security and reliability have become m...
Covert channels aim to hide the existence of communication between two or more parties. Such channel...
Side-channel attacks (SCAs) are powerful attacks that could be used to retrieve keys from electronic...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channe...
Abstract. Temperature effects can be used to maliciously affect the behavior of digital crypto-circu...
We present a new class of covert channels which can be created by utilizing common hardware but tha...