Systems-on-Chips (SoCs) are one of the key enabling technologies for the Internet-of-Things (IoT). Given the continuous distribution of IoT devices, data confidentiality and user privacy are of utmost importance. However, with the growing complexity of SoCs, the risk of malware infections and trojans introduced at design time increases significantly. A vital threat to system security are so-called side-channel attacks based on cache observations. While mainly studied on desktop and server systems, recent publications have analyzed cache attacks on mobile devices and network-on-chip platforms. In this work, we investigate cache attacks on System-on-Chips implementing bus based communication. To this end, we present two contributions. First, ...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
The CPU cache is a hardware element that leaks significant information about the software running on...
The CPU cache is a hardware element that leaks significant information about the software running on...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
Privacy protection is an essential part of information security. The use of shared resources demands...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
This paper proposes the first cache timing side-channel attack on one of Apple’s mobile devices. Uti...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The report describes the development of several software side-channel attacks which exploit cache v...
Increased peripheral performance is causing strain on the memory subsystem of modern processors. For...
In this paper we present two attacks that exploit cache events, which are visible in some side chann...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...
The CPU cache is a hardware element that leaks significant information about the software running on...
The CPU cache is a hardware element that leaks significant information about the software running on...
Android smartphones collect and compile a huge amount of sensitive information which is secured usin...
Side-channel attacks have been exploiting weaknesses of cryptographic primitives as soon as they beg...
International audienceThis paper presents a run-time detection mechanism for access-driven cache-bas...
Privacy protection is an essential part of information security. The use of shared resources demands...
Remote side-channel attacks on processors exploit hardware and micro-architectural effects observabl...
This paper proposes the first cache timing side-channel attack on one of Apple’s mobile devices. Uti...
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike p...
The report describes the development of several software side-channel attacks which exploit cache v...
Increased peripheral performance is causing strain on the memory subsystem of modern processors. For...
In this paper we present two attacks that exploit cache events, which are visible in some side chann...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to cr...
In modern computing environments, hardware resources are commonly shared, and parallel computation i...