Articles with "channel attacks" as a keyword



Photo by zynpayln from unsplash

MemWander: Memory Dynamic Remapping via Hypervisor Against Cache-Based Side-Channel Attacks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2018.2886372

Abstract: Current countermeasures against last level cache (LLC) based non-memory-sharing side-channel attacks (LNSA), which is a powerful and practical cache attack in the cloud, fail in practical due to their shortage of generality or efficiency. Motivated… read more here.

Keywords: side channel; cache; memory; channel attacks ... See more keywords
Photo by vita_belvita from unsplash

Mitigating Timing-Based NoC Side-Channel Attacks With LLC Remapping

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Computer Architecture Letters"

DOI: 10.1109/lca.2023.3276709

Abstract: Recent CPU microarchitectural attacks utilize contention over the NoC to mount covert and side-channel attacks on multicore CPUs and leak information from victim applications. We propose NoIR, a dynamic LLC slice selection mechanism using slice… read more here.

Keywords: channel attacks; side channel; timing based; mitigating timing ... See more keywords
Photo by hajjidirir from unsplash

Imbalanced Data Problems in Deep Learning-Based Side-Channel Attacks: Analysis and Solution

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2021.3092050

Abstract: In recent years, the threat of profiling attacks using deep learning has emerged. Successful attacks have been demonstrated against various types of cryptographic modules. However, the application of deep learning to side-channel attacks (SCAs) is… read more here.

Keywords: side channel; analysis; learning based; channel attacks ... See more keywords