In recent years, static power side-channel analysis attacks have emerged...
The drive to create thinner, lighter, and more energy efficient devices ...
USB is the most prevalent peripheral interface in modern computer system...
Over the last two decades, the danger of sharing resources between progr...
Browser fingerprinting aims to identify users or their devices, through
...
Side-channel attacks that leak sensitive information through a computing...
The "eternal war in cache" has reached browsers, with multiple cache-bas...
Rowhammer is a hardware vulnerability in DRAM memory, where repeated acc...
Recent transient-execution attacks, such as RIDL, Fallout, and ZombieLoa...
Since their introduction over two decades ago, physical side-channel att...
Recently, out-of-order execution, an important performance optimization ...
Website fingerprinting attacks, which use statistical analysis on networ...
Timing channels enable data leakage that threatens the security of compu...
The security of computer systems fundamentally relies on memory isolatio...
Modern processors use branch prediction and speculative execution to max...