Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure
RISC-V is equipped with physical memory protection (PMP) to prevent malicious software from accessing protected memory regions. PMP provides a trusted execution environment (TEE) that isolates secure and insecure applications. In this study, we propose a side-channel-assisted fault-injection attack...
Guardado en:
Autores principales: | Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Ruhr-Universität Bochum
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/20acd16b715a47dcb012b21010bed659 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
Composite Enclaves: Towards Disaggregated Trusted Execution
por: Moritz Schneider, et al.
Publicado: (2021) -
Practical Multiple Persistent Faults Analysis
por: Hadi Soleimany, et al.
Publicado: (2021) -
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
por: Tim Fritzmann, et al.
Publicado: (2021) -
PECSA: Practical Edge Computing Service Architecture Applicable to Adaptive IoT-Based Applications
por: Jianhua Liu, et al.
Publicado: (2021) -
Passive Fault-Tolerant Control of a 2-DOF Robotic Helicopter
por: Manuel A. Zuñiga, et al.
Publicado: (2021)