Demo Abstract: Leveraging Side-Channels to Turn Processors into Low Overhead Radios
Abstract
References
Index Terms
- Demo Abstract: Leveraging Side-Channels to Turn Processors into Low Overhead Radios
Recommendations
Everything has its Bad Side and Good Side: Turning Processors to Low Overhead Radios Using Side-Channels
IPSN '23: Proceedings of the 22nd International Conference on Information Processing in Sensor NetworksSide-channels have traditionally been exploited as a means of uncovering sensitive information such as cryptographic keys from a computing device. In particular, past work has shown that electromagnetic (EM) radiation from a device’s processor and memory ...
Delay-on-Squash: Stopping Microarchitectural Replay Attacks in Their Tracks
MicroScope and other similar microarchitectural replay attacks take advantage of the characteristics of speculative execution to trap the execution of the victim application in a loop, enabling the attacker to amplify a side-channel attack by executing it ...
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityThis paper analyzes the vulnerability space arising in Trusted Execution Environments (TEEs) when interfacing a trusted enclave application with untrusted, potentially malicious code. Considerable research and industry effort has gone into developing ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Demonstration
- Research
- Refereed limited
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 80Total Downloads
- Downloads (Last 12 months)52
- Downloads (Last 6 weeks)8
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in