Suchergebnisse - Security and privacy Security in hardware Hardware attacks and countermeasures
-
1
LeakyDSP: Exploiting Digital Signal Processing Blocks to Sense Voltage Fluctuations in FPGAs
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… In recent years, cloud providers are dedicated to enabling FPGA multi-tenancy to improve resource utilization, but this new sharing model introduces power …”
Volltext
Tagungsbericht -
2
Fortifying RTL Locking Against Oracle-Less (Untrusted Foundry) and Oracle-Guided Attacks
Veröffentlicht: IEEE 05.12.2021Veröffentlicht in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“… Logic locking protects integrated circuits (IC) against intellectual property (IP) theft, IC overbuilding, and hardware Trojan insertion …”
Volltext
Tagungsbericht -
3
Securing Hardware via Dynamic Obfuscation Utilizing Reconfigurable Interconnect and Logic Blocks
Veröffentlicht: IEEE 05.12.2021Veröffentlicht in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“… However, with the increasing magnitude of successful hardware attacks, the security of many hardware IPs has been compromised …”
Volltext
Tagungsbericht -
4
TimingSAT: Timing Profile Embedded SAT Attack
ISSN: 1558-2434Veröffentlicht: ACM 01.11.2018Veröffentlicht in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (01.11.2018)“… In order to enhance the security of logic obfuscation schemes, delay based logic locking has been proposed in combination with traditional functional logic locking approaches in recent literature …”
Volltext
Tagungsbericht -
5
LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution
ISSN: 1558-2434Veröffentlicht: ACM 01.11.2018Veröffentlicht in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (01.11.2018)“… ) attacks subvert these schemes and keep the control flow of the code intact. In this paper, we present LiteHAX, an efficient hardware-assisted remote attestation …”
Volltext
Tagungsbericht -
6
A Combined Logical and Physical Attack on Logic Obfuscation
ISSN: 1558-2434Veröffentlicht: ACM 29.10.2022Veröffentlicht in 2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD) (29.10.2022)“… it. Countermeasures often exploit the resulting blind-spots to thwart these attacks, limiting their scalability and generalizability …”
Volltext
Tagungsbericht -
7
TWiCe: Preventing Row-hammering by Exploiting Time Window Counters
ISSN: 2575-713XVeröffentlicht: ACM 01.06.2019Veröffentlicht in 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA) (01.06.2019)“… Computer systems using DRAM are exposed to row-hammer (RH) attacks, which can flip data in a DRAM row without directly accessing a row but by frequently activating its adjacent ones …”
Volltext
Tagungsbericht -
8
SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels
ISSN: 2641-7936Veröffentlicht: IEEE 01.09.2019Veröffentlicht in Proceedings / International Conference on Parallel Architectures and Compilation Techniques (01.09.2019)“… Hardware security has recently re-surfaced as a first-order concern to the confidentiality protections of computing systems …”
Volltext
Tagungsbericht -
9
DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA
Veröffentlicht: IEEE 05.12.2021Veröffentlicht in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“… ), such virtualization environments have posed many new security issues. This work investigates the integrity of DNN FPGA accelerators in clouds …”
Volltext
Tagungsbericht -
10
Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
ISSN: 1558-2434Veröffentlicht: ACM 01.11.2018Veröffentlicht in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (01.11.2018)“… With the globalization of manufacturing and supply chains, ensuring the security and trustworthiness of ICs has become an urgent challenge …”
Volltext
Tagungsbericht -
11
ZenLeak: Practical Last-Level Cache Side-Channel Attacks on AMD Zen Processors
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… While Last-Level Cache (LLC) side-channel attacks often target inclusive caches, directory-based attacks on noninclusive caches have been demonstrated on Intel and ARM processors …”
Volltext
Tagungsbericht -
12
Late Breaking Results: The Hidden Risks of Activation Duration in PLPUFs
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… The security of Internet of Things (IoT) devices is crucial to protect the vast amounts of data exposed due to their widespread adoption …”
Volltext
Tagungsbericht -
13
"OOPS!": Out-Of-Band Remote Power Side-Channel Attacks on Intel SGX and TDX
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… Prior work shows that remote power attacks on Intel processors are possible through two Model Specific Registers (MSRs …”
Volltext
Tagungsbericht -
14
Ragnar: Exploring Volatile-Channel Vulnerabilities on RDMA NIC
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… This paper presents RAGNAR, a comprehensive suite of hardware-contention-based volatile-channel attacks leveraging the underexplored security vulnerabilities in RDMA hardware …”
Volltext
Tagungsbericht -
15
GNN4IP: Graph Neural Network for Hardware Intellectual Property Piracy Detection
Veröffentlicht: IEEE 05.12.2021Veröffentlicht in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“… Watermarking and fingerprinting are proposed to detect IP piracy. Nevertheless, they come with additional hardware overhead and cannot guarantee IP security as advanced attacks are reported to remove the watermark, forge, or bypass …”
Volltext
Tagungsbericht -
16
A Novel Covert Timing Channel for Cloud FPGAs
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… remote power analysis attacks on cloud services, such as Amazon Web Services Elastic Compute Cloud (AWS EC2 …”
Volltext
Tagungsbericht -
17
FALCON Down: Breaking FALCON Post-Quantum Signature Scheme through Side-Channel Attacks
Veröffentlicht: IEEE 05.12.2021Veröffentlicht in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“… This paper proposes the first side-channel attack on FALCON-a NIST Round-3 finalist for the post-quantum digital signature standard …”
Volltext
Tagungsbericht -
18
Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning
Veröffentlicht: IEEE 05.12.2021Veröffentlicht in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“… This presents a large barrier to those interested in applying DL for SCA. In this paper, we propose a novel attack mechanism that adopts meta-transfer learning to transfer …”
Volltext
Tagungsbericht -
19
Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level
ISSN: 1558-2434Veröffentlicht: ACM 01.11.2018Veröffentlicht in 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (01.11.2018)“… The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used …”
Volltext
Tagungsbericht -
20
Data Oblivious CPU: Microarchitectural Side-channel Leakage-Resilient Processor
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… Mitigating microarchitectural side channels remains a central challenge in hardware security …”
Volltext
Tagungsbericht