This repository contains the design files and software required to reproduce the results in the paper "Instruction-Level Power Side-Channel Leakage Evaluation of Soft-Core CPUs on Shared FPGAs" by Ognjen Glamocanin, Shashwat Shrivastava, Jinwei Yao, Nour Ardo, Mathias Payer, and Mirjana Stojilovic. The paper is accepted for publication in the Springer Journal of Hardware and Systems Security (special issue on Multi-tenant Computing Security Challenges and Solutions). The README file explains the structure and the contents of the repository, as well as how to use the provided software and data. Paper abstract: Side-channel disassembly attacks recover CPU instructions from power or electromagnetic side-channel traces measured during code e...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
International audienceAs FPGA use becomes more diverse, the shareduse of these devices becomes a sec...
Side-channel CPU disassembly is a side-channel attack that allows an adversary to recover instructio...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
International audienceAs FPGA use becomes more diverse, the shareduse of these devices becomes a sec...
Side-channel CPU disassembly is a side-channel attack that allows an adversary to recover instructio...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
International audienceThis chapter presents the main Side-Channel Attacks, a kind of hardware crypta...
The rapid increase in the use of embedded systems for performing secure transactions, has proportion...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
The advancement of digital silicon technology brings a variety of novel embedded systems to our dail...
Mobile appliances and especially smart cards have found more and more applications in the past two d...
In traditional cryptography, an attacker tries to infer a mathematical relationship between the inpu...
International audienceAs FPGA use becomes more diverse, the shareduse of these devices becomes a sec...