A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †
2018
Cryptography
To address this issue, the Row Hammer PUF has been proposed by Schaller et al., which leverages the row hammer effect in DRAM modules to reduce the retention times of their cells and, therefore, significantly ...
As our results prove, the Row Hammer PUF could potentially provide an adequate level of security for Commercial Off-The-Shelf (COTS) devices, if its dependency on temperature is mitigated, and, may therefore ...
This paper extends the work of Schaller et al., demonstrating that the row hammer effect can be utilised to provide run-time accessible cryptographic applications and improved security. ...
doi:10.3390/cryptography2030013
fatcat:ec6iyndbpfdkreqa27aj53ewna
An Overview of DRAM-Based Security Primitives
2018
Cryptography
size, and the easy way in which they can be accessed, even at run-time. ...
Cryptography 2018, 2, 7 2 of 33 This has led to an increased interest for hardware-based security primitives, such as Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs), because ...
Acknowledgments: This work has been partly funded by the DFG (Deutsche Forschungsgemeinschaft; German Research Foundation) as part of project P3 within the CRC (Collaborative Research Center) 1119 CROSSING ...
doi:10.3390/cryptography2020007
fatcat:43ohhg2ctzhrzlv7msocufwg3e
Foundations of Secure Scaling (Dagstuhl Seminar 16342)
2017
Dagstuhl Reports
Indeed, the relations between scaling and the resulting security are poorly understood. ...
This report documents the program and the outcomes of Dagstuhl Seminar 16342 "Foundations of Secure Scaling". ...
For instance, in the Bernstein's cache timing attack, we try to invoke the AES encryption by .xing part of the input, and randomize other parts of the inputs and obtain the total time for the encryption ...
doi:10.4230/dagrep.6.8.65
dblp:journals/dagstuhl-reports/BatinaBSS16
fatcat:qya6rznvonbi7pfic7ocbxwkea
A Modern Primer on Processing in Memory
[article]
2020
arXiv
pre-print
At the same time, conventional memory technology is facing many technology scaling challenges in terms of reliability, energy, and performance. ...
purposes (e.g., graphics, low-power, high bandwidth, low latency), and the necessity of designing new solutions to serious reliability and security issues, such as the RowHammer phenomenon, are an evidence ...
PUFs are commonly used in cryptography to identify devices based on the uniqueness of their physical microstructures. ...
arXiv:2012.03112v1
fatcat:hq2i2xzq4nbszenq7rqmjzcjci
Dagstuhl Reports, Volume 6, Issue 8, August 2016, Complete Issue
[article]
2017
Which technologies and design patterns are most effective for monitoring SLAs in real-time? What run-time adaptation and performance optimisations are practical to implement in business processes? ...
In a fault attack, an adversary breaches the security by injecting faults into the underlying processor hardware and observing their effects in the output of the running software. ...
Latin grammar, and submitted and accepted to the International Journal of Systemic and Evolutionary Microbiology (a fun read on the topic is at http: //biorxiv.org/content/biorxiv/early/2016/01/19/037325 ...
doi:10.4230/dagrep.6.8
fatcat:jhbruchpmvdthoe45w75w35wpe
Editorial Associate: Position Papers of the 2017 Federated Conference on Computer Science and Information Systems and Information Systems Cover photo
Polskie Towarzystwo Informatyczne Annals of Computer Science and Information Systems
unpublished
Dominik Slezak, Warsaw University for his comments on the presentation.
ACKNOWLEDGMENT This work is fully supported by the eAsy inteLligent service Platform for Healthy Ageing (ALPHA) Project. ...
ACKNOWLEDGMENT This work was supported by the Business Informatics Group at Dublin City University and in part, by Science Foundation Ireland grant 13/RC/2094 and co-funded under the European Regional ...
post-quantum cryptography [12] for encryption, which is secure against quantum computer attacks, and blockchain for authentication without single point of failure. ...
fatcat:bln7ujge4zfqrijt5une7cce3q