A Comprehensive Survey of Attacks without Physical Access Targeting Hardware Vulnerabilities in IoT/IIoT Devices, and Their Detection Mechanisms
暂无分享,去创建一个
Vincent Beroulle | Pierre-Henri Thevenon | Maxime Puys | Nikolaos Foivos Polychronou | V. Beroulle | Pierre-Henri Thevenon | Maxime Puys
[1] Ramesh Karri,et al. Attacks and Defenses for JTAG , 2010, IEEE Design & Test of Computers.
[2] Jakub Szefer,et al. Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses , 2018, Journal of Hardware and Systems Security.
[3] Ning Zhang,et al. TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices , 2016, IACR Cryptol. ePrint Arch..
[4] Chris Fallin,et al. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[5] Assia Tria,et al. Voltage Glitch Attacks on Mixed-Signal Systems , 2014, 2014 17th Euromicro Conference on Digital System Design.
[6] Cemal Yilmaz,et al. MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks , 2019, IACR Cryptol. ePrint Arch..
[7] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[8] Rami G. Melhem,et al. Counter-Based Tree Structure for Row Hammering Mitigation in DRAM , 2017, IEEE Computer Architecture Letters.
[9] Guy Gogniat,et al. Meet the Sherlock Holmes’ of Side Channel Leakage: A Survey of Cache SCA Detection Techniques , 2020, IEEE Access.
[10] David Naccache,et al. Cryptographically secure shields , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[11] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[12] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[13] Régis Leveugle,et al. Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA , 2011, Journal of Cryptology.
[14] Thomas F. Wenisch,et al. Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow , 2019, IEEE Micro.
[15] L. Bossuet,et al. JTAG Fault Injection Attack , 2018, IEEE Embedded Systems Letters.
[16] Fengwei Zhang,et al. Hardware-Assisted Transparent Tracing and Debugging on ARM , 2019, IEEE Transactions on Information Forensics and Security.
[17] Marco Chiappetta,et al. Real time detection of cache-based side-channel attacks using hardware performance counters , 2016, Appl. Soft Comput..