Filters








119 Hits in 4.3 sec

Guest Editors' Introduction to the Special Issue on Hardware Security

Amro Awad, Rujia Wang
2020 IEEE transactions on computers  
of shared resources while maintaining strong security guarantees and protections against microarchitecture state attacks.  ...  Recently discovered hardware vulnerabilities, such as Spectre and Meltdown, are striking evidence that today's computing systems are untenable without deliberate consideration of the security aspects at  ...  In MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning, the authors propose a robust cross-architecture IoT malware hunting model based on advanced ensemble  ... 
doi:10.1109/tc.2020.3021223 fatcat:nz37oxlhovahlbggly7iwpl22i

Hardware-assisted Machine Learning in Resource-constrained IoT Environments for Security: Review and Future Prospective

Georgios Kornaros
2022 IEEE Access  
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart devices act in concert, rarely requiring human intervention, posing significant challenges in supporting trusted  ...  This review aims to illuminate the value of various approaches for addressing IoT security in a truly effective, flexible, and seamless manner, as well as to provide answers to questions about tradeoffs  ...  On top, a growing concern involves how machine learning assists in securing IoT infrastructures, or if deep learning reverses the effects of countermeasures.  ... 
doi:10.1109/access.2022.3179047 fatcat:damwrncpzzbxzamtghwlmrg6v4

[Front matter]

2020 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
The Program Chairs tracked the number of years each candidate has served on the TPC. Past and potential TPC members outline their top ten topics of expertise in hardware and systems security.  ...  The past Program Chairs scored past and potential TPC members in terms of participation in HOST, quality of prior reviews, etc. This information was provided to a constrained optimization program.  ...  Recent advances in Deep Learning based power/EM Side-Channel Analysis (DL-SCA) allows an attack with a single or a few encryptions.  ... 
doi:10.1109/host45689.2020.9300269 fatcat:nruhx3qym5evvpk3bbki7pvfdq

Energy-Secure System Architectures (ESSA): A Workshop Report

Pradip Bose, Saibal Mukhopadhyay
2019 IEEE Micro  
to verify security;security architecture extended to DMA engines UC San Diego H/W Architecture Dean M Tullsen tullsen@cs.used.edu Anti-fragility approach learns from attacks;machine learning  ...  Sethumadhavan, "Blacklist core: machine-learning-based power management tampering,") where machine-learning-based dynamic operating performance point blacklisting is used for mitigating software based  ... 
doi:10.1109/mm.2019.2921508 fatcat:l4v772v6p5fwpbg3w2o4itf7dm

Foundations of Secure Scaling (Dagstuhl Seminar 16342)

Lejla Batina, Swarup Bhunia, Patrick Schaumont, Jean-Pierre Seifert, Marc Herbstritt
2017 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 16342 "Foundations of Secure Scaling".  ...  This seminar facilitated the discussion between security experts at different abstraction levels in order to uncover the links between scaling and the resulting security.  ...  We would like to evaluate the physical security of crypto across integration and technology. We consider two cases: 1. cache attacks ,2. fault injection attacks.  ... 
doi:10.4230/dagrep.6.8.65 dblp:journals/dagstuhl-reports/BatinaBSS16 fatcat:qya6rznvonbi7pfic7ocbxwkea

Prefetch Side-Channel Attacks

Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
We introduce Prefetch Side-Channel Attacks, a new class of generic attacks exploiting major weaknesses in prefetch instructions.  ...  Hence, the kernel security relies fundamentally on preventing access to address information.  ...  ACKNOWLEDGMENTS We would like to thank Klaus Wagner for help with some experiments and our anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.1145/2976749.2978356 dblp:conf/ccs/GrussMFLM16 fatcat:js24xk7cnjcy7mfgvxe5j67aq4

A Survey on RISC-V Security: Hardware and Architecture [article]

Tao Lu
2021 arXiv   pre-print
In recent years, the free and open RISC-V ISA standard has attracted the attention of industry and academia and is becoming the mainstream.  ...  In order to fill this research gap, this paper presents an in-depth survey on RISC-V security technologies.  ...  [150] propose two new detection methods based on machine learning.  ... 
arXiv:2107.04175v1 fatcat:hr6avyprj5dvpav2pvnmfmvg2a

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

Vikas Hassija, Vinay Chamola, Vikas Saxena, Divyansh Jain, Pranav Goyal, Biplab Sikdar
2019 IEEE Access  
Four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.  ...  In this paper, a detailed review of the security-related challenges and sources of threat in the IoT applications is presented.  ...  IoT SECURITY USING MACHINE LEARNING The area of machine learning (ML) has attracted significant interest over recent years.  ... 
doi:10.1109/access.2019.2924045 fatcat:a375yvrpmvaotm6z4hujbgfyam

Fallout

Claudio Canella, Berk Sunar, Jo Van Bulck, Yuval Yarom, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz
2019 Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS '19  
Due to hardware fixes, these mitigations are disabled on recent processors. In this paper, we show that Meltdown-like attacks are still possible on recent CPUs which are not vulnerable to Meltdown.  ...  We identify two behaviors of the store buffer, a microarchitectural resource to reduce the latency for data stores, that enable powerful attacks.  ...  corresponding to recent writes. (2) We demonstrate the security implications of the WTF shortcut by recovering the values of recent writes performed by the OS kernel, recovering data from within TSX transactions  ... 
doi:10.1145/3319535.3363219 dblp:conf/ccs/CanellaGGGLMMP019 fatcat:7kijycv2qvaylir3tcjcyyt67e

Security Vulnerabilities of SGX and Countermeasures

Shufan Fei, Zheng Yan, Wenxiu Ding, Haomeng Xie
2021 ACM Computing Surveys  
Unfortunately, existing literature lacks a thorough review of security vulnerabilities of SGX and their countermeasures. In this article, we fill this gap.  ...  After that, we review published attacks and existing countermeasures, as well as evaluate them by employing our proposed criteria.  ...  offered by corresponding countermeasures. • We propose a taxonomy of the security vulnerabilities of SGX, and analyzing their corresponding attack vectors thoroughly. • We review existing attacks and countermeasures  ... 
doi:10.1145/3456631 fatcat:c6h5jqaomvewzpazlzhdqkq4qi

SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers

Thomas Rokicki, Clementine Maurice, Pierre Laperdrix
2021 2021 IEEE European Symposium on Security and Privacy (EuroS&P)  
We focus on determining to what extent the changes on timing-based countermeasures impact browser security.  ...  However, as these attacks multiplied in the last years, so did the countermeasures, in a cat-and-mouse game fashion.  ...  Acknowledgments We thank the reviewers and our shepherd for their helpful feedback.  ... 
doi:10.1109/eurosp51992.2021.00039 fatcat:5mdajbpt5zf5znd46mvmouaqva

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
2019 Security and Communication Networks  
The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real-time, online computations.  ...  Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable.  ...  Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work.  ... 
doi:10.1155/2019/1368905 fatcat:izynm6msrvehfa3ghkw7tykk34

A taxonomy and survey of attacks on digital signatures

Jorge L. Hernandez-Ardieta, Ana I. Gonzalez-Tablas, Jose M. de Fuentes, Benjamin Ramos
2013 Computers & security  
The inevitability of vulnerabilities in technology and the non-negligible probability of an occurrence of security threats would make non-repudiation of evidence difficult to achieve.  ...  We consider that it is of the utmost importance to develop appropriate tools and methods to assist in designing and implementing secure systems in a way that reliable digital signatures can be produced  ...  Ensure the physical security of the machine and the room.  ... 
doi:10.1016/j.cose.2012.11.009 fatcat:2vzmgcwwzfbr3hhpnt37cbusou

Inspection resistant memory: Architectural support for security from physical examination

Jonathan Valamehr, Melissa Chase, Seny Kamara, Andrew Putnam, Dan Shumow, Vinod Vaikuntanathan, Timothy Sherwood
2012 2012 39th Annual International Symposium on Computer Architecture (ISCA)  
We examine the relationship between security, area, and efficiency in these architectures, and quantitatively examine the resulting systems through cryptographic analysis and microarchitectural impact.  ...  The ability to safely keep a secret in memory is central to the vast majority of security schemes, but storing and erasing these secrets is a difficult problem in the face of an attacker who can obtain  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their insightful comments. This research was funded in part by National Science Foundation Grant CNS-0910734.  ... 
doi:10.1109/isca.2012.6237012 dblp:conf/isca/ValamehrCKPSVS12 fatcat:a465jtwzrfalxdlxrth2l5cpii

SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems

David Cerdeira, Nuno Santos, Pedro Fonseca, Sandro Pinto
2020 2020 IEEE Symposium on Security and Privacy (SP)  
Unfortunately, these attacks have been possible by the presence of security flaws in TEE systems.  ...  Hundreds of millions of mobile devices worldwide rely on Trusted Execution Environments (TEEs) built with Arm TrustZone for the protection of security-critical applications (e.g., DRM) and operating system  ...  Acknowledgments: We thank our shepherd David Kohlbrenner and the anonymous reviewers for their comments and suggestions. We are grateful to Joakim Bech for the insightful discussions about OP-TEE.  ... 
doi:10.1109/sp40000.2020.00061 dblp:conf/sp/Cerdeira0FP20 fatcat:pzj3uu3vvfb4ra24pre2c5s3jm
« Previous Showing results 1 — 15 out of 119 results