Spectre and Meltdown have pushed the research community toward an otherwise-unavailable understanding of the security implications of processors’ microarchitecture. Notwithstanding, research efforts have concentrated on highend processors (e.g., Intel, AMD, Arm Cortex-A), and very little has been done for microcontrollers (MCU) that power billions of small embedded and IoT devices. In this paper, we present BUSted. BUSted is a novel side-channel attack that explores the side effects of the MCU bus interconnect arbitration logic to bypass security guarantees enforced by memory protection primitives. Side-channel attacks on MCUs pose incremental and unforeseen challenges, which are strictly tied to the resource-constrained nature of these s...
Advances in cryptography have enabled the features of confidentiality, security, and integrity on sm...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Multi-processor systems are becoming the de-facto standard across different computing domains, rangi...
Modern microcontrollers (MCUs) come packed with features to support rising demand of security and pr...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
The discrepancy between the abstract model used to reason about the security of computer systems and...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most ...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
Abstract. By shrinking the technology and reducing the energy require-ments of integrated circuits, ...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Advances in cryptography have enabled the features of confidentiality, security, and integrity on sm...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Multi-processor systems are becoming the de-facto standard across different computing domains, rangi...
Modern microcontrollers (MCUs) come packed with features to support rising demand of security and pr...
Side-channel attacks have become a severe threat to the confidentiality of computer applications and...
The discrepancy between the abstract model used to reason about the security of computer systems and...
The growing Internet of Things (IoT) market demands side-channel attack resistant, efficient, crypto...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Side channel attack vectors found in microarchitecture of computing devices expose systems to potent...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Recent developments on hardware-based trusted execution environments, such as the Software Guard Ext...
Over the course of recent years, microarchitectural side-channel attacks emerged as one of the most ...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
Abstract. By shrinking the technology and reducing the energy require-ments of integrated circuits, ...
Moore’s law has, for almost half a century, described a trend in which the number of transistors in ...
Advances in cryptography have enabled the features of confidentiality, security, and integrity on sm...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
Multi-processor systems are becoming the de-facto standard across different computing domains, rangi...