The need for energy optimizations in modern systems forces CPU vendors to provide Dynamic Voltage Frequency Scaling (DVFS) interfaces that allow software to control the voltage and frequency of CPU cores. In recent years, the accessibility of such DVFS interfaces to adversaries has amounted to a plethora of fault attack vectors. In response, the current countermeasures involve either restricting access to DVFS interfaces or including additional compiler-based checks that let the DVFS fault occur but prevent an adversary from weaponizing it. However, such countermeasures are overly restrictive because (1) they prevent benign, non-SGX processes from utilizing DVFS, and (2) rely upon a less practical threat model than what is acceptable for In...
Limit studies on Dynamic Voltage and Frequency Scaling (DVFS) provide apparently contradictory concl...
In recent years, circuit reliability in modern high-performance processors has become increasingly i...
Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret ...
Modern CPUs adapt clock frequencies and voltage levels to workloads to reduce energy consumption and...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
In this paper, we show that stress-tests can be potentially used as power-noise viruses in denial-of...
Most modern processors use Dynamic Voltage and Frequency Scaling (DVFS) for power management. DVFS a...
Power-noise viruses can be used as denial-of-service attacks by causing voltage emergencies in multi...
Aggressive technology scaling is increasing the impact of soft errors on microprocessor reliability....
We describe and evaluate two new, independently-applicable power reduction techniques for power mana...
International audienceToday, most embedded systems use Dynamic Voltage and Frequency Scaling (DVFS) ...
We propose and evaluate two new and independently-applicable techniques, process-driven voltage scal...
As processor clock gating becomes more and more prevalent, the resulting processor current fluctuati...
Differential power analysis (DPA) attack is a major concern for secure embedded devices (Ravi et al....
Limit studies on Dynamic Voltage and Frequency Scaling (DVFS) provide apparently contradictory concl...
In recent years, circuit reliability in modern high-performance processors has become increasingly i...
Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret ...
Modern CPUs adapt clock frequencies and voltage levels to workloads to reduce energy consumption and...
This repository contains data to reproduce results from the paper "Plundervolt: Software-based Fault...
Dynamic frequency and voltage scaling features have been introduced to manage ever-growing heat and ...
In this paper, we show that stress-tests can be potentially used as power-noise viruses in denial-of...
Most modern processors use Dynamic Voltage and Frequency Scaling (DVFS) for power management. DVFS a...
Power-noise viruses can be used as denial-of-service attacks by causing voltage emergencies in multi...
Aggressive technology scaling is increasing the impact of soft errors on microprocessor reliability....
We describe and evaluate two new, independently-applicable power reduction techniques for power mana...
International audienceToday, most embedded systems use Dynamic Voltage and Frequency Scaling (DVFS) ...
We propose and evaluate two new and independently-applicable techniques, process-driven voltage scal...
As processor clock gating becomes more and more prevalent, the resulting processor current fluctuati...
Differential power analysis (DPA) attack is a major concern for secure embedded devices (Ravi et al....
Limit studies on Dynamic Voltage and Frequency Scaling (DVFS) provide apparently contradictory concl...
In recent years, circuit reliability in modern high-performance processors has become increasingly i...
Non-invasive side-channel attacks (SCA) are powerful attacks which can be used to obtain the secret ...