|
|
|
Thermal
- The Temperature Side Channel and Heating Fault Attacks, cardis, 2014 [PDF] [Slides][ePrint]
use the heating as an active attack.
Hardware Trojan Detection
- Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps, 2014 [PDF]
- Golden Chip-Free Detection of Automatically Inserted Hardware Trojans, 2018 [PDF]
A hardware demo paper by University of Florida at HOST2018
Cold Boot Attack (CBA)
- LestWe Remember: Cold Boot Attacks on Encryption Keys, 2008. [PDF] [Official Link]
The very first paper about CBA
- An in-depth analysis of the cold boot attack, 2011. [PDF]
by Defence R&D Canada.
- Frost: Forensic Recovery of Scrambled Telephones, ACNS, 2012. [PDF]
The very first CBA on mobile. Conference version [PDF]
- Hidden in snow, revealed in thaw. Cold boot attacks revisited
, 2014. [PDF]
A review paper.
- Copker: Computing with Private Keys without RAM, NDSS 2014. [PDF]
Guanle's countermeasure1 at NDSS.
- Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory, IEEE SP, 2015 [PDF]
Guanle's countermeasure2 at IEEE SP.
- Survery of cold boot attack, 2015. [PDF]
A review paper in Chinese.
- A Systematic Assessment of the Security of Full Disk Encryption, IEEE TDSC, 2015. [PDF]
An assessment of using CBA to attack FDE.
- Cryptographic key protection against FROST for mobile devices, 2017. [PDF]
A countermeasure designed for mobile, by Zhang Xiaosong.
- A Practical Cold Boot Attack on RSA Private Keys, AsianHOST, 2017. [PDF] [Slides]
- Cold Boot Attacks are Still Hot:
Security Analysis of Memory Scramblers in Modern Processors, IEEE HPCA, 2017. [PDF]
A CCF-A paper. HPCA is a very good conference
- Cold Boot Attacks on NTRU, Indocrypt, 2017. [PDF]
- A patent from Lin Jingqiang. [PDF]
|
|