Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they began being implemented on embedded systems. The intent has typically been to recover cryptographic keys that are usually difficult to extract by relying solely on the mathematical constructs of these algorithms. Several countermeasures have been developed to protect implementations of cryptographic algorithms from such attacks.However, embedded systems store many types of data that flow through the memory hierarchy and can be as sensitive as encryption keys. Examples include personal and confidential user data (authentication codes, medical information, etc.). This thesis focuses on the threats posed by side channel attacks on the memory hierar...