Literatura académica sobre el tema "Micro-Architectural Attacks"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Micro-Architectural Attacks".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Micro-Architectural Attacks"
Alam, Manaar, Sarani Bhattacharya y Debdeep Mukhopadhyay. "Victims Can Be Saviors". ACM Journal on Emerging Technologies in Computing Systems 17, n.º 2 (abril de 2021): 1–31. http://dx.doi.org/10.1145/3439189.
Texto completoPolychronou, Nikolaos-Foivos, Pierre-Henri Thevenon, Maxime Puys y Vincent Beroulle. "A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms". ACM Transactions on Design Automation of Electronic Systems 27, n.º 1 (31 de enero de 2022): 1–35. http://dx.doi.org/10.1145/3471936.
Texto completoXiong, Wenjie y Jakub Szefer. "Survey of Transient Execution Attacks and Their Mitigations". ACM Computing Surveys 54, n.º 3 (junio de 2021): 1–36. http://dx.doi.org/10.1145/3442479.
Texto completoSepúlveda, Johanna, Mathieu Gross, Andreas Zankl y Georg Sigl. "Beyond Cache Attacks". ACM Transactions on Embedded Computing Systems 20, n.º 2 (marzo de 2021): 1–23. http://dx.doi.org/10.1145/3433653.
Texto completoRebeiro, Chester y Debdeep Mukhopadhyay. "Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation". IEEE Transactions on Computers 64, n.º 3 (marzo de 2015): 778–90. http://dx.doi.org/10.1109/tc.2013.212.
Texto completoZeitschner, Jannik y Amir Moradi. "PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 3 (18 de julio de 2024): 342–76. http://dx.doi.org/10.46586/tches.v2024.i3.342-376.
Texto completoBusi, Matteo, Job Noorman, Jo Van Bulck, Letterio Galletta, Pierpaolo Degano, Jan Tobias Mühlberg y Frank Piessens. "Securing Interruptible Enclaved Execution on Small Microprocessors". ACM Transactions on Programming Languages and Systems 43, n.º 3 (30 de septiembre de 2021): 1–77. http://dx.doi.org/10.1145/3470534.
Texto completoYu, Jiyong, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas y Christopher W. Fletcher. "Speculative taint tracking (STT)". Communications of the ACM 64, n.º 12 (diciembre de 2021): 105–12. http://dx.doi.org/10.1145/3491201.
Texto completoVu, Son Tuan, Albert Cohen, Arnaud De Grandmaison, Christophe Guillon y Karine Heydemann. "Reconciling optimization with secure compilation". Proceedings of the ACM on Programming Languages 5, OOPSLA (20 de octubre de 2021): 1–30. http://dx.doi.org/10.1145/3485519.
Texto completoAlam, Manaar, Sarani Bhattacharya, Sayan Sinha, Chester Rebeiro y Debdeep Mukhopadhyay. "IPA: an Instruction Profiling–Based Micro-architectural Side-Channel Attack on Block Ciphers". Journal of Hardware and Systems Security 3, n.º 1 (12 de diciembre de 2018): 26–44. http://dx.doi.org/10.1007/s41635-018-0060-3.
Texto completoTesis sobre el tema "Micro-Architectural Attacks"
Lu, Shiting. "Micro-architectural Attacks and Countermeasures". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-65733.
Texto completoInci, Mehmet Sinan. "Micro-architectural Threats to Modern Computing Systems". Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/528.
Texto completoForcioli, Quentin. "Modeling of micro-architecture for security with gem5". Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT033.
Texto completoEmbedded systems are the target of a wide variety of attacks, both software and hardware level. Microarchitectural attacks are particularly difficult to study. By taking advantage of the specific behaviors of systems-on-achip, these attacks enable an attacker to take control of a system or protected resources, bypassing process isolation mechanisms. These attacks can target all element in an SoC: CPU, caches, memory, accelerators (FPGA, GPU), interfaces, etc. The Trusted Execution Environment (TEE), key element of SoC security and involved in securing banking applications, is also the target of micro-architectural attacks. In this thesis, I adopt a simulation-based approach to security: through a virtual platform based on gem5, I reproduce and study micro-architectural attacks against TEEs. To achieve this, I improved gem5’s support for TEEs, allowing the use of an open-source TEE (OP-TEE) I also augmented the GDB debugger present in gem5 to allow the study of attack scenarios, leveraging the simulator environment. With this interface, I created TEE-Time, a tool to analyze cache-timing weaknesses. Thanks to TEE-Time, I found vulnerabilities in standard RSA implementations in OP-TEE, I validated this vulnerabilities with cache timing attacks simulated using my virtual platform. To further validate these attacks on a real system, I developed a virtual platform reproducing the RockPi4 board. To simulate the Rockchip RK3399 SoC on the RockPi4, I developed PyDevices fast-prototyping tools for system devices using gem5’s Python interface. Through cache timing simulation, I discovered that the RK3399 uses AutoLock, an ARM-specific cache protocol. Compiling AutoLock into gem5, I ran my attack scenario targeting OP-TEE’s RSA implementation on the RK3399 simulation. By executing this same attack without any modification on a RockPi4, I managed to leak an average of 30% of the RSA key bits, thus making the link between cache attacks and their exploitation in a real system
Capítulos de libros sobre el tema "Micro-Architectural Attacks"
Ducousso, Soline, Sébastien Bardin y Marie-Laure Potet. "Adversarial Reachability for Program-level Security Analysis". En Programming Languages and Systems, 59–89. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30044-8_3.
Texto completoMandal, Upasana, Rupali Kalundia, Nimish Mishra, Shubhi Shukla, Sarani Bhattacharya y Debdeep Mukhopadhyay. "“There’s Always Another Counter”: Detecting Micro-Architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting". En Lecture Notes in Computer Science, 201–20. Cham: Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-80408-3_13.
Texto completoAlam, Manaar, Sarani Bhattacharya y Debdeep Mukhopadhyay. "Tackling the Time-Defence: An Instruction Count Based Micro-architectural Side-Channel Attack on Block Ciphers". En Security, Privacy, and Applied Cryptography Engineering, 30–52. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71501-8_3.
Texto completo"Micro-architectural attacks and countermeasures on public-key implementations". En Frontiers in Hardware Security and Trust; Theory, design and practice, 143–71. Institution of Engineering and Technology, 2020. http://dx.doi.org/10.1049/pbcs066e_ch7.
Texto completoActas de conferencias sobre el tema "Micro-Architectural Attacks"
"SECURING OPENSSL AGAINST MICRO-ARCHITECTURAL ATTACKS". En International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0002118801890196.
Texto completoShen, Chaoqun, Congcong Chen y Jiliang Zhang. "Micro-architectural Cache Side-Channel Attacks and Countermeasures". En ASPDAC '21: 26th Asia and South Pacific Design Automation Conference. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3394885.3431638.
Texto completoNelson, Casey, Joseph Izraelevitz, R. Iris Bahar y Tamara Silbergleit Lehman. "Eliminating Micro-Architectural Side-Channel Attacks using Near Memory Processing". En 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, 2022. http://dx.doi.org/10.1109/seed55351.2022.00023.
Texto completoWei, Shijia, Aydin Aysu, Michael Orshansky, Andreas Gerstlauer y Mohit Tiwari. "Using Power-Anomalies to Counter Evasive Micro-Architectural Attacks in Embedded Systems". En 2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2019. http://dx.doi.org/10.1109/hst.2019.8740838.
Texto completoTan, Ya, Jizeng Wei y Wei Guo. "The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack". En 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2014. http://dx.doi.org/10.1109/trustcom.2014.38.
Texto completo