2021 19th IEEE International New Circuits and Systems Conference (NEWCAS) 2021
DOI: 10.1109/newcas50681.2021.9462776
|View full text |Cite
|
Sign up to set email alerts
|

Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…We benefit from HPCs to measure the stress that malicious applications induce in the hardware components of the microprocessor. We developed a testbench [12] that allows experimenting and evaluating different side effects. In this case, the side effects represent the differences in the behavior of HPCs in the presence or not of a malicious vector.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We benefit from HPCs to measure the stress that malicious applications induce in the hardware components of the microprocessor. We developed a testbench [12] that allows experimenting and evaluating different side effects. In this case, the side effects represent the differences in the behavior of HPCs in the presence or not of a malicious vector.…”
Section: Methodsmentioning
confidence: 99%
“…In this case, the side effects represent the differences in the behavior of HPCs in the presence or not of a malicious vector. In [12], we presented the testbench which allows us to measure the efficiency of State Of The Art (SOTA) solutions in different architectures. We studied simple thresholdbased implementations targeting to detect only CacheSCA and Rowhammer.…”
Section: Methodsmentioning
confidence: 99%
“…Side-channel attacks use information, such as sound, power, and time, leaked by a system (especially the cryptosystem) to crack the system (key) [6,7]. Cache attacks are side-channel attacks that pose a significant threat to IoT devices [8,9]; they mainly exploit the inherent vulnerability of modern processors. They differ entirely from pure software attacks.…”
Section: Introductionmentioning
confidence: 99%