Microarchitectural timing side channels have been thoroughly investigated as a security threat in hardware designs featuring shared buffers (e.g., caches) and/or parallelism between attacker and victim task execution. Contradicting common intuitions, recent activities demonstrate, however, that this threat is real also in microcontroller SoCs without such features. In this paper, we describe SoC-wide timing side channels previously neglected by security analysis and present a new formal method to close this gap. In a case study with the RISC-V Pulpissimo SoC platform, our method found a vulnerability to a so far unknown attack variant that allows an attacker to obtain information about a victim's memory access behavior. After implementing a...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
Timing side-channels are an identified threat for security critical software. Existing countermeasur...
SoCs are required to maintain information private when requested by the Operating System (OS) or the...
Microarchitectural timing channels exploit resource contentions on a shared hardware platform to cau...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
International audienceTiming side-channels are an identified threat for security critical software. ...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...
Since the advent of the modern microprocessor, the pursuit of better performance has led to increase...
Abstract This paper proposes a new memory controller design that enables secure sharing of main memo...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
Embedded computers control an increasing number of systems directly interacting with humans, while a...
There exist various vulnerabilities in computing hardware that adversaries can exploit to mount atta...
There are several vulnerabilities in computing systems hardware that can be exploited by attackers t...
International audienceNumerous timing side-channels attacks have been proposed in the recent years, ...
Modern computing systems are becoming increasingly vulnerable to timing channel attacks that leak co...
Timing side-channels are an identified threat for security critical software. Existing countermeasur...
SoCs are required to maintain information private when requested by the Operating System (OS) or the...
Microarchitectural timing channels exploit resource contentions on a shared hardware platform to cau...
This book deals with timing attacks on software implementations of encryption algorithms. It describ...
International audienceTiming side-channels are an identified threat for security critical software. ...
This paper presents timing compartments, a hardware architecture abstraction that eliminates m...
Since the advent of the modern microprocessor, the pursuit of better performance has led to increase...
Abstract This paper proposes a new memory controller design that enables secure sharing of main memo...
International audienceSide-channel attacks exploit power consumption, execution time, or any other p...
Recent years have seen various side-channel timing attacks demonstrated on both CPUs and GPUs, in di...
Embedded computers control an increasing number of systems directly interacting with humans, while a...