A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Guest Editors' Introduction to the Special Issue on Hardware Security
2020
IEEE transactions on computers
of shared resources while maintaining strong security guarantees and protections against microarchitecture state attacks. ...
Recently discovered hardware vulnerabilities, such as Spectre and Meltdown, are striking evidence that today's computing systems are untenable without deliberate consideration of the security aspects at ...
In MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning, the authors propose a robust cross-architecture IoT malware hunting model based on advanced ensemble ...
doi:10.1109/tc.2020.3021223
fatcat:nz37oxlhovahlbggly7iwpl22i
Hardware-assisted Machine Learning in Resource-constrained IoT Environments for Security: Review and Future Prospective
2022
IEEE Access
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart devices act in concert, rarely requiring human intervention, posing significant challenges in supporting trusted ...
This review aims to illuminate the value of various approaches for addressing IoT security in a truly effective, flexible, and seamless manner, as well as to provide answers to questions about tradeoffs ...
On top, a growing concern involves how machine learning assists in securing IoT infrastructures, or if deep learning reverses the effects of countermeasures. ...
doi:10.1109/access.2022.3179047
fatcat:damwrncpzzbxzamtghwlmrg6v4
[Front matter]
2020
2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
The Program Chairs tracked the number of years each candidate has served on the TPC. Past and potential TPC members outline their top ten topics of expertise in hardware and systems security. ...
The past Program Chairs scored past and potential TPC members in terms of participation in HOST, quality of prior reviews, etc. This information was provided to a constrained optimization program. ...
Recent advances in Deep Learning based power/EM Side-Channel Analysis (DL-SCA) allows an attack with a single or a few encryptions. ...
doi:10.1109/host45689.2020.9300269
fatcat:nruhx3qym5evvpk3bbki7pvfdq
Energy-Secure System Architectures (ESSA): A Workshop Report
2019
IEEE Micro
to verify security;security
architecture extended to DMA engines
UC San
Diego
H/W Architecture
Dean M Tullsen
tullsen@cs.used.edu
Anti-fragility approach learns from attacks;machine
learning ...
Sethumadhavan, "Blacklist core: machine-learning-based power management tampering,") where machine-learning-based dynamic operating performance point blacklisting is used for mitigating software based ...
doi:10.1109/mm.2019.2921508
fatcat:l4v772v6p5fwpbg3w2o4itf7dm
Foundations of Secure Scaling (Dagstuhl Seminar 16342)
2017
Dagstuhl Reports
This report documents the program and the outcomes of Dagstuhl Seminar 16342 "Foundations of Secure Scaling". ...
This seminar facilitated the discussion between security experts at different abstraction levels in order to uncover the links between scaling and the resulting security. ...
We would like to evaluate the physical security of crypto across integration and technology. We consider two cases: 1. cache attacks ,2. fault injection attacks. ...
doi:10.4230/dagrep.6.8.65
dblp:journals/dagstuhl-reports/BatinaBSS16
fatcat:qya6rznvonbi7pfic7ocbxwkea
Prefetch Side-Channel Attacks
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
We introduce Prefetch Side-Channel Attacks, a new class of generic attacks exploiting major weaknesses in prefetch instructions. ...
Hence, the kernel security relies fundamentally on preventing access to address information. ...
ACKNOWLEDGMENTS We would like to thank Klaus Wagner for help with some experiments and our anonymous reviewers for their valuable comments and suggestions. ...
doi:10.1145/2976749.2978356
dblp:conf/ccs/GrussMFLM16
fatcat:js24xk7cnjcy7mfgvxe5j67aq4
A Survey on RISC-V Security: Hardware and Architecture
[article]
2021
arXiv
pre-print
In recent years, the free and open RISC-V ISA standard has attracted the attention of industry and academia and is becoming the mainstream. ...
In order to fill this research gap, this paper presents an in-depth survey on RISC-V security technologies. ...
[150] propose two new detection methods based on machine learning. ...
arXiv:2107.04175v1
fatcat:hr6avyprj5dvpav2pvnmfmvg2a
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019
IEEE Access
Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed. ...
In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented. ...
IoT SECURITY USING MACHINE LEARNING The area of machine learning (ML) has attracted significant interest over recent years. ...
doi:10.1109/access.2019.2924045
fatcat:a375yvrpmvaotm6z4hujbgfyam
Fallout
2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS '19
Due to hardware fixes, these mitigations are disabled on recent processors. In this paper, we show that Meltdown-like attacks are still possible on recent CPUs which are not vulnerable to Meltdown. ...
We identify two behaviors of the store buffer, a microarchitectural resource to reduce the latency for data stores, that enable powerful attacks. ...
corresponding to recent writes. (2) We demonstrate the security implications of the WTF shortcut by recovering the values of recent writes performed by the OS kernel, recovering data from within TSX transactions ...
doi:10.1145/3319535.3363219
dblp:conf/ccs/CanellaGGGLMMP019
fatcat:7kijycv2qvaylir3tcjcyyt67e
Security Vulnerabilities of SGX and Countermeasures
2021
ACM Computing Surveys
Unfortunately, existing literature lacks a thorough review of security vulnerabilities of SGX and their countermeasures. In this article, we fill this gap. ...
After that, we review published attacks and existing countermeasures, as well as evaluate them by employing our proposed criteria. ...
offered by corresponding countermeasures. • We propose a taxonomy of the security vulnerabilities of SGX, and analyzing their corresponding attack vectors thoroughly. • We review existing attacks and countermeasures ...
doi:10.1145/3456631
fatcat:c6h5jqaomvewzpazlzhdqkq4qi
SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers
2021
2021 IEEE European Symposium on Security and Privacy (EuroS&P)
We focus on determining to what extent the changes on timing-based countermeasures impact browser security. ...
However, as these attacks multiplied in the last years, so did the countermeasures, in a cat-and-mouse game fashion. ...
Acknowledgments We thank the reviewers and our shepherd for their helpful feedback. ...
doi:10.1109/eurosp51992.2021.00039
fatcat:5mdajbpt5zf5znd46mvmouaqva
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
2019
Security and Communication Networks
The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real-time, online computations. ...
Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable. ...
Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work. ...
doi:10.1155/2019/1368905
fatcat:izynm6msrvehfa3ghkw7tykk34
A taxonomy and survey of attacks on digital signatures
2013
Computers & security
The inevitability of vulnerabilities in technology and the non-negligible probability of an occurrence of security threats would make non-repudiation of evidence difficult to achieve. ...
We consider that it is of the utmost importance to develop appropriate tools and methods to assist in designing and implementing secure systems in a way that reliable digital signatures can be produced ...
Ensure the physical security of the machine and the room. ...
doi:10.1016/j.cose.2012.11.009
fatcat:2vzmgcwwzfbr3hhpnt37cbusou
Inspection resistant memory: Architectural support for security from physical examination
2012
2012 39th Annual International Symposium on Computer Architecture (ISCA)
We examine the relationship between security, area, and efficiency in these architectures, and quantitatively examine the resulting systems through cryptographic analysis and microarchitectural impact. ...
The ability to safely keep a secret in memory is central to the vast majority of security schemes, but storing and erasing these secrets is a difficult problem in the face of an attacker who can obtain ...
Acknowledgments The authors would like to thank the anonymous reviewers for their insightful comments. This research was funded in part by National Science Foundation Grant CNS-0910734. ...
doi:10.1109/isca.2012.6237012
dblp:conf/isca/ValamehrCKPSVS12
fatcat:a465jtwzrfalxdlxrth2l5cpii
SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems
2020
2020 IEEE Symposium on Security and Privacy (SP)
Unfortunately, these attacks have been possible by the presence of security flaws in TEE systems. ...
Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments (TEEs) built with Arm TrustZone for the protection of security-critical applications (e.g., DRM) and operating system ...
Acknowledgments: We thank our shepherd David Kohlbrenner and the anonymous reviewers for their comments and suggestions. We are grateful to Joakim Bech for the insightful discussions about OP-TEE. ...
doi:10.1109/sp40000.2020.00061
dblp:conf/sp/Cerdeira0FP20
fatcat:pzj3uu3vvfb4ra24pre2c5s3jm
« Previous
Showing results 1 — 15 out of 119 results