[Google Scholar]

Notes: side channel

Differential Power Analysis, Language based security, Side Channel

  • Hardware is the new software [baumann:hotos:2017]
  • Stealthy dopant-level hardware Trojans [becker:ches:2013]
  • Combining mechanized proofs and model-based testing in the formal analysis of a hypervisor [becker:fm:2016]
  • Revisiting capacitor-based Trojan design [bidmeshki:iccd:2019]
  • SoK: Design tools for side-channel-aware implementations [buhan:ccs:2022]
  • Attacking, repairing, and verifying SecVisor: A retrospective on the security of a hypervisor [franklin:cmu:2008]
  • A survey of microarchitectural timing attacks and countermeasures on contemporary hardware [ge:jce:2016]
  • Differential power analysis [kocher:crypto:1999]
  • Quantifying information flow [lowe:csfw:2015]
  • Spectre is here to stay: An analysis of side-channels and speculative execution [mcilroy:arxiv:2019]
  • Obtaining information leakage bounds via approximate model counting [saha:pldi:2023]
  • SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes [seshadri:sosp:2007]
  • überSpark: Enforcing verifiable object abstractions for automated compositional security analysis of a hypervisor [vasudevan:usenix:2016]
  • A2: Analog malicious hardware [yang:sandp:2016]