Secure elements physically exposed to adversaries are frequently targete...
Fault attacks enable adversaries to manipulate the control-flow of
secur...
With the improvements in computing technologies, edge devices in the
Int...
Fault injection (FI) is a powerful attack methodology allowing an advers...
Fault attacks are active, physical attacks that an adversary can leverag...
Isolation is a long-standing challenge of software security. Traditional...
With the improvements of computing technology, more and more application...
Memory vulnerabilities are a major threat to many computing systems. To
...
To ensure secure and trustworthy execution of applications, vendors
freq...
Reading and writing memory are, besides computation, the most common
ope...
In typical software, many comparisons and subsequent branch operations a...
Embedded devices in the Internet of Things (IoT) face a wide variety of
...
The security of computer systems fundamentally relies on memory isolatio...
Modern processors use branch prediction and speculative execution to max...
Double-fetch bugs are a special type of race condition, where an unprivi...
Near-sensor data analytics is a promising direction for IoT endpoints, a...