Remote side-channel attacks on processors exploit hardware and micro-architectural effects observable from software measurements. So far, the analysis of micro-architectural leakages over physical side-channels (power consumption, electromagnetic field) received little treatment. In this paper, we argue that those attacks are a serious threat, especially against systems such as smartphones and Internet-of-Things (IoT) devices which are physically exposed to the end-user. Namely, we show that the observation of Dynamic Random Access Memory (DRAM) accesses with an electromagnetic (EM) probe constitutes a reliable alternative to time measurements in cache side-channel attacks. We describe the EVICT+EM attack, that allows recovering a full AES...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
D.Ing. (Electrical Engineering)Abstract: Power Analysis or Side-Channel Attack aimed at embedded sys...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Increased complexity in modern embedded systems has presented various important challenges with rega...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Part 3: Trusted ExecutionInternational audienceSide-channel attacks (SCA) exploit the reification of...
In this paper we present two attacks that exploit cache events, which are visible in some side chann...
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of le...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...
Power side-channel attacks exploit variations in power consumption to extract secrets from a device,...
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-con...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
D.Ing. (Electrical Engineering)Abstract: Power Analysis or Side-Channel Attack aimed at embedded sys...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...
Increased complexity in modern embedded systems has presented various important challenges with rega...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
This thesis deals with physical attacks on implementations of cryptographic algorithms and counterme...
Security and trustworthiness are key considerations in designing modern processor hardware. It has b...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Part 3: Trusted ExecutionInternational audienceSide-channel attacks (SCA) exploit the reification of...
In this paper we present two attacks that exploit cache events, which are visible in some side chann...
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of le...
Some algorithms running with compromised data select cache memory as a type of secure memory where d...
Power side-channel attacks exploit variations in power consumption to extract secrets from a device,...
The threat of side-channels is becoming increasingly prominent for resource-constrained internet-con...
International audienceDeployed widely and embedding sensitive data, IoT devices depend on the reliab...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
D.Ing. (Electrical Engineering)Abstract: Power Analysis or Side-Channel Attack aimed at embedded sys...
Advancements in technology, the need for automation and ease of manufacturability, have made embedde...