This paper presents a version of the 2{sup}k-ary modular exponentiation algorithm that is secure against current methods of side-channel analysis that can be applied to PCs (the so-called micro-architectural attacks). Some optimisations to the basic algorithm are also proposed to improve the ...
Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern processors and operating systems. This includes Intel, AMD, and ARM. ...
The code space to generate gadgets is large and attacks using these gadgets are Turing-complete. One big challenge to harden the program against ROP attack is to confine gadget selection to a limited locations, thus leaving the attacker to search entire code space according to payload criteria. ...
We follow the principles of profiled instruction attacks and show that the proposed attack is more potent than the well-known cache timing attacks in literature. We also perform experiments on ciphers implemented with popular time fuzzing schemes to subvert timing attacks. Our results show that ...
Micro-architectural featuresAs the variety and complexity of attacks continue to increase, software-based malware detection can impose significant performance overhead. Recent works have demonstrated the feasibility of malware detection using hardware performance counters. Therefore, equipping a malware ...
We follow the principles of profiled instruction attacks and show that the proposed attack is more potent than the well-known cache timing attacks in literature. We also perform experiments on ciphers implemented with popular time fuzzing schemes to subvert timing attacks. Our results show that ...
Cortex-M3Masking is a common technique to protect software implementations of symmetric cryptographic algorithms against Differential Power Analysis (DPA) attacks. The development of a properly masked version of a block cipher is an incremental and time-consuming process since each iteration of the ...
Masking is a common technique to protect software imple- mentations of symmetric cryptographic algorithms against Differential Power Analysis (DPA) attacks. The development of a properly masked version of a block cipher is an incremental and time-consuming process since each iteration of the ...
Micro-architectural featuresAs the variety and complexity of attacks continue to increase, software-based malware detection can impose significant performance overhead. Recent works have demonstrated the feasibility of malware dHuicheng PengTianjin UniversityJizeng Wei...
Physical attacksFault modelsElectromagnetic fault injection (EMFI)System-on-chip (SoC)The last years have seen the emergence of fault attacks targeting modern central processing units (CPUs). These attacks are analyzed at a very high abstraction level and, due to the modern CPUs complexity, the ...