International audienceIn the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valuable element to protect against information theft. Many first-order side-channel attackshave been reported on all its components from the main memory to the CPU registers. In this context, memory hierarchy encryption is widely used to ensure data confidentiality. Yet, this solution suffers from both memory and area overhead along with performance losses (timing delays), which is especially critical for cache memories that already occupy a large part of the spatial footprint of a processor. In this paper, we propose a secure and lightweight scheme to ensure the data confidentiality through the whole memory hierarchy. This...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valu...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Side-channel attacks constitute a concrete threat to IoT systems-on-a-chip (SoCs). Embedded memories...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
In this paper, we present MemShuffle, an end-to-end mem-ory protection scheme that resists several a...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
Over past few decades, various ways have been conducted through side channel attacks to steal inform...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valu...
Les attaques par canaux auxiliaires ont traditionnellement permis d’exploiter les vulnérabilités des...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Side-channel attacks constitute a concrete threat to IoT systems-on-a-chip (SoCs). Embedded memories...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The last decade has recorded an increase in security protocols for integrated circuits and memory sy...
In this paper, we present MemShuffle, an end-to-end mem-ory protection scheme that resists several a...
Abstract. Block Memory Content Scrambling (BMS), presented at CHES 2011, enables an effective way of...
Over past few decades, various ways have been conducted through side channel attacks to steal inform...
We expand on the idea, proposed by Kelsey et al. [14], of cache memory being used as a side-channel ...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Modern high-performance CPUs depend on speculative out-of-order execution in order to offer high per...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...