A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection enforced by the operating system and steal the s...
Saved in:
Main Authors: | Lou, Xiaoxuan, Zhang, Tianwei, Jiang, Jun, Zhang, Yinqian |
---|---|
Other Authors: | School of Computer Science and Engineering |
Format: | Article |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/156083 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Microarchitecture modeling for timing analysis of embedded software
by: LI XIANFENG
Published: (2010) -
ENERGY EFFICIENT, RECONFIGURABLE MICROARCHITECTURES FOR DSP ACCELERATORS, MEMORIES AND MICROPROCESSOR-BASED SYSTEMS
by: SAURABH JAIN
Published: (2018) -
Topics in cryptography
by: Koh, Edison Rui Xuan
Published: (2024) -
Correlation of cancellous bone microarchitectural parameters from microCT to CT number and bone mechanical properties
by: Teo, J.C.M., et al.
Published: (2014) -
Pseudo-randomness in cryptography
by: Bansal Arushi
Published: (2024)