Výsledky vyhledávání - Security and privacy Security in hardware Hardware attacks and countermeasures

  1. 1

    LeakyDSP: Exploiting Digital Signal Processing Blocks to Sense Voltage Fluctuations in FPGAs Autor Zhang, Xin, Zou, Jiajun, Yang, Yi, Shen, Qingni, Zhang, Zhi, Gao, Yansong, Wu, Zhonghai, Carlson, Trevor E.

    Vydáno: IEEE 22.06.2025
    “…In recent years, cloud providers are dedicated to enabling FPGA multi-tenancy to improve resource utilization, but this new sharing model introduces power…”
    Získat plný text
    Konferenční příspěvek
  2. 2

    Fortifying RTL Locking Against Oracle-Less (Untrusted Foundry) and Oracle-Guided Attacks Autor Limaye, Nimisha, Chowdhury, Animesh B., Pilato, Christian, Nabeel, Mohammed T. M., Sinanoglu, Ozgur, Garg, Siddharth, Karri, Ramesh

    Vydáno: IEEE 05.12.2021
    “…Logic locking protects integrated circuits (IC) against intellectual property (IP) theft, IC overbuilding, and hardware Trojan insertion…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks Autor Kolhe, Gaurav, Salehi, Soheil, Sheaves, Tyler David, Homayoun, Houman, Rafatirad, Setareh, Sai, Manoj P D, Sasan, Avesta

    Vydáno: IEEE 05.12.2021
    “… However, with the increasing magnitude of successful hardware attacks, the security of many hardware IPs has been compromised…”
    Získat plný text
    Konferenční příspěvek
  4. 4

    TimingSAT: Timing Profile Embedded SAT Attack Autor Chakraborty, Abhishek, Liu, Yuntao, Srivastava, Ankur

    ISSN: 1558-2434
    Vydáno: ACM 01.11.2018
    “…In order to enhance the security of logic obfuscation schemes, delay based logic locking has been proposed in combination with traditional functional logic locking approaches in recent literature…”
    Získat plný text
    Konferenční příspěvek
  5. 5

    LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution Autor Dessouky, Ghada, Abera, Tigist, Ibrahim, Ahmad, Sadeghi, Ahmad-Reza

    ISSN: 1558-2434
    Vydáno: ACM 01.11.2018
    “…) attacks subvert these schemes and keep the control flow of the code intact. In this paper, we present LiteHAX, an efficient hardware-assisted remote attestation…”
    Získat plný text
    Konferenční příspěvek
  6. 6

    A Combined Logical and Physical Attack on Logic Obfuscation Autor Zuzak, Michael, Liu, Yuntao, McDaniel, Isaac, Srivastava, Ankur

    ISSN: 1558-2434
    Vydáno: ACM 29.10.2022
    “… it. Countermeasures often exploit the resulting blind-spots to thwart these attacks, limiting their scalability and generalizability…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    TWiCe: Preventing Row-hammering by Exploiting Time Window Counters Autor Lee, Eojin, Kang, Ingab, Lee, Sukhan, Suh, G. Edward, Ahn, Jung Ho

    ISSN: 2575-713X
    Vydáno: ACM 01.06.2019
    “…Computer systems using DRAM are exposed to row-hammer (RH) attacks, which can flip data in a DRAM row without directly accessing a row but by frequently activating its adjacent ones…”
    Získat plný text
    Konferenční příspěvek
  8. 8

    SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels Autor Barber, Kristin, Bacha, Anys, Zhou, Li, Zhang, Yinqian, Teodorescu, Radu

    ISSN: 2641-7936
    Vydáno: IEEE 01.09.2019
    “…Hardware security has recently re-surfaced as a first-order concern to the confidentiality protections of computing systems…”
    Získat plný text
    Konferenční příspěvek
  9. 9

    DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA Autor Luo, Yukui, Gongye, Cheng, Fei, Yunsi, Xu, Xiaolin

    Vydáno: IEEE 05.12.2021
    “…), such virtualization environments have posed many new security issues. This work investigates the integrity of DNN FPGA accelerators in clouds…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs Autor Patnaik, Satwik, Ashraf, Mohammed, Sinanoglu, Ozgur, Knechtel, Johann

    ISSN: 1558-2434
    Vydáno: ACM 01.11.2018
    “…With the globalization of manufacturing and supply chains, ensuring the security and trustworthiness of ICs has become an urgent challenge…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    ZenLeak: Practical Last-Level Cache Side-Channel Attacks on AMD Zen Processors Autor Wang, Han, Tang, Ming, Wang, Quancheng, Xu, Ke, Zhang, Yinqian

    Vydáno: IEEE 22.06.2025
    “…While Last-Level Cache (LLC) side-channel attacks often target inclusive caches, directory-based attacks on noninclusive caches have been demonstrated on Intel and ARM processors…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    Late Breaking Results: The Hidden Risks of Activation Duration in PLPUFs Autor Alsharkawy, Mohamed, Zwerschke, Jan, Nassar, Hassan, Gonzalez-Gomez, Jeferson, Henkel, Jorg

    Vydáno: IEEE 22.06.2025
    “…The security of Internet of Things (IoT) devices is crucial to protect the vast amounts of data exposed due to their widespread adoption…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    "OOPS!": Out-Of-Band Remote Power Side-Channel Attacks on Intel SGX and TDX Autor Mishra, Nimish, Arya, Kislay, Bhattacharya, Sarani, Saxena, Paritosh, Mukhopadhyay, Debdeep

    Vydáno: IEEE 22.06.2025
    “…Prior work shows that remote power attacks on Intel processors are possible through two Model Specific Registers (MSRs…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    Ragnar: Exploring Volatile-Channel Vulnerabilities on RDMA NIC Autor Xu, Yunpeng, Fan, Yuchen, Ma, Teng, Deng, Shuwen

    Vydáno: IEEE 22.06.2025
    “… This paper presents RAGNAR, a comprehensive suite of hardware-contention-based volatile-channel attacks leveraging the underexplored security vulnerabilities in RDMA hardware…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    GNN4IP: Graph Neural Network for Hardware Intellectual Property Piracy Detection Autor Yasaei, Rozhin, Yu, Shih-Yuan, Naeini, Emad Kasaeyan, Faruque, Mohammad Abdullah Al

    Vydáno: IEEE 05.12.2021
    “… Watermarking and fingerprinting are proposed to detect IP piracy. Nevertheless, they come with additional hardware overhead and cannot guarantee IP security as advanced attacks are reported to remove the watermark, forge, or bypass…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    A Novel Covert Timing Channel for Cloud FPGAs Autor Udugama, Brian, Jayasinghe, Darshana, Saadat, Hassaan, Ignjatovic, Aleksandar, Parameswaran, Sri

    Vydáno: IEEE 22.06.2025
    “… remote power analysis attacks on cloud services, such as Amazon Web Services Elastic Compute Cloud (AWS EC2…”
    Získat plný text
    Konferenční příspěvek
  17. 17

    FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks Autor Karabulut, Emre, Aysu, Aydin

    Vydáno: IEEE 05.12.2021
    “…This paper proposes the first side-channel attack on FALCON-a NIST Round-3 finalist for the post-quantum digital signature standard…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning Autor Yu, Honggang, Shan, Haoqi, Panoff, Maximillian, Jin, Yier

    Vydáno: IEEE 05.12.2021
    “… This presents a large barrier to those interested in applying DL for SCA. In this paper, we propose a novel attack mechanism that adopts meta-transfer learning to transfer…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level Autor Schellenberg, Falk, Gnad, Dennis R.E., Moradi, Amir, Tahoori, Mehdi B.

    ISSN: 1558-2434
    Vydáno: ACM 01.11.2018
    “…The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    Data Oblivious CPU: Microarchitectural Side-channel Leakage-Resilient Processor Autor Omidi, Behnam, Alouani, Ihsen, Khasawneh, Khaled N.

    Vydáno: IEEE 22.06.2025
    “…Mitigating microarchitectural side channels remains a central challenge in hardware security…”
    Získat plný text
    Konferenční příspěvek