Zephyrnet Logo

Security Research: Technical Paper Round-Up

Date:

New hardware security technical papers include side-channel attacks, rowhammer, on-chip mesh interconnect attacks, heterogeneous attacks on cache hierarchies, GPU-assisted information flow analysis, vehicular security

popularity

A number of hardware security-related technical papers were presented at recent conferences, including the August 2022 USENIX Security Symposium, IEEE’s International Symposium on Hardware Oriented Security and Trust (HOST), as well as other publications. Topics include side-channel attacks and defenses (including on-chip mesh interconnect attacks), heterogeneous attacks on cache hierarchies, rowhammer attacks and mitigations, GPU-assisted information flow analysis, vehicular security, and more. Here are some highlights with associated links:

Technical Paper Research Organizations
Multiphysics Simulation of EM Side-Channels from Silicon Backside with ML-based Auto-POI Identification (**best paper award**) Ansys, National Taiwan University and Kobe University
Don’t Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects University of Illinois at Urbana-Champaign, MIT, Texas Advanced Computing Center
Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies Imec-COSIC, KU Leuven
“Half-Double: Hammering From the Next Row Over Graz University of Technology, Lamarr Security Research, Google, AWS, and Rivos
AMD Prefetch Attacks through Power and Time Graz University of Technology and CISPA Helmholtz Center for Information Security
FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation National University of Singapore and an independent researcher
SAID: State-aware Defense Against Injection Attacks on In-vehicle Network Hong Kong Polytechnic University, Zhejiang University, and Texas A&M University
PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security University of Tennessee
Jenny: Securing Syscalls for PKU-based Memory Isolation Systems Graz University of Technology (Austria)
Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker University of Illinois Urbana-Champaign and Tel Aviv University

A complete listing of all papers presented at this summer’s USENIX conference can be found here. The organization provides open access research, and the presentation slides and papers are free to the public. Other topics covered include cryptography, authentication, smart vehicle and mobile security, machine learning, cryptocurrency, machine learning, fuzzing and more.

Semiconductor Engineering is in the process of building this library of research papers, with security-specific papers here. Please send suggestions (via comments section below) for what else you’d like us to incorporate. If you have research papers you are trying to promote, we will review them to see if they are a good fit for our global audience. At a minimum, papers need to be well researched and documented, relevant to the semiconductor ecosystem, and free of marketing bias. There is no cost involved for us posting links to papers.

Related Reading
Chip Backdoors: Assessing The Threat
Steps are being taken to minimize problems, but they will take years to implement.
Is Standardization Required For Security?
Why and how the semiconductor ecosystem needs to come together on security.
Security Risks Widen With Commercial Chiplets
Choosing components from a multi-vendor menu holds huge promise for reducing costs and time-to-market, but it’s not as simple as it sounds.
Why It’s So Difficult — And Costly — To Secure Chips
Threats are growing and widening, but what is considered sufficient can vary greatly by application or by user. Even then, it may not be enough.

Linda Christensen

Linda Christensen

  (all posts)

Linda Christensen is vice president of operations and a contributing writer at Semiconductor Engineering.

spot_img

Latest Intelligence

spot_img

Chat with us

Hi there! How can I help you?