Implementing Cryptographic Algorithms for the RISC-V Instruction Set Architecture in Two Cases


This new technical paper titled "Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms" was published by researchers at Intel, North Arizona University and Google, with partial funding from U.S. Air Force Research Laboratory. Abstract "The ever-increasing need for securing computing systems using cryptographic algorithms is spurring interest in the efficient i... » read more

Formal Verification Methodology For Detecting Security-Critical Bugs in HW & in the HW/Firmware Interface of SoCs (Award Winner)


A new technical paper titled "A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level" was this year's first place winner of Intel's Hardware Security Academic Award program.   The approach utilizes UPEC (Unique Program Execution Checking) to identify functional design bugs causing confidentiality violations, covering both the processor and its peripherals. ... » read more

Using GPUs to Speed Up DFIT Analysis


Researchers at National University of Singapore and an independent researcher presented a new technical paper titled "FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation" at the USENIX Security Symposium in Boston in August 2022. Abstract: "Dynamic Information Flow Tracking (DIFT) forms the foundation of a wide range of security and privacy analyses. The ... » read more

An Escalation of Rowhammer To Rows Beyond Immediate Neighbors


Researchers at Graz University of Technology, Lamarr Security Research, Google, AWS, and Rivos presented this new technical paper titled "Half-Double: Hammering From the Next Row Over" at the USENIX Security Symposium in Boston in August 2022. Abstract: "Rowhammer is a vulnerability in modern DRAM where repeated accesses to one row (the aggressor) give off electrical disturbance whose cumu... » read more

Heterogenous Computing & Cache Attacks


Researchers at imec-COSIC, KU Leuven presented this paper titled "Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies" at the USENIX Security Symposium in Boston in August 2022. Note, this is a prepublication paper. Abstract: "As the performance of general-purpose processors faces diminishing improvements, computing systems are increasingly equipped with domai... » read more

Microarchitectural Side-Channel Attacks and Mitigations on the On-Chip Mesh Interconnect


This new technical paper titled "Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects" was presented by researchers at University of Illinois at Urbana-Champaign, MIT, and Texas Advanced Computing Center at the USENIX Security Symposium in Boston in August 2022. Abstract: "This paper studies microarchitectural side-channel attacks and mitigations on the on-chip mes... » read more

Defending Against Message Injection Attacks in Vehicles


This technical paper titled "SAID: State-aware Defense Against Injection Attacks on In-vehicle Network" was presented by researchers at the Hong Kong Polytechnic University, Zhejiang University, and Texas A&M University at the USENIX Security Symposium in Boston in August 2022. Abstract: "Modern vehicles are equipped with many ECUs (Electronic Control Unit) that are connected to the IVN (... » read more

Syscall Attacks on PKU-based Isolation Systems (Graz University of Technology)


This technical paper titled "Jenny: Securing Syscalls for PKU-based Memory Isolation Systems" was presented by researchers at Graz University of Technology (Austria) at the USENIX Security Symposium in Boston in August 2022. Abstract: "Effective syscall filtering is a key component for withstanding the numerous exploitation techniques and privilege escalation attacks we face today. For exam... » read more

Side-Channel Attack “Binoculars” Exploits Interactions Between HW Page Walk Operations & Other Memory Operations


New technical paper titled "Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker" was presented by researchers at University of Illinois Urbana-Champaign and Tel Aviv University at the USENIX Security Symposium in Boston in August 2022. Abstract: "Microarchitectural side channels are a pressing security threat. These channels are created when programs modulate hardw... » read more

Vehicle Security: Post-Quantum Security to the CAN Network


This new technical paper titled "PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security" is published by researchers at University of Tennessee. Abstract "The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vit... » read more

← Older posts Newer posts →