2017
DOI: 10.1016/j.mejo.2017.02.010
|View full text |Cite
|
Sign up to set email alerts
|

Defending cache memory against cold-boot attacks boosted by power or EM radiation analysis

Abstract: Some algorithms running with compromised data select cache memory as a type of secure memory where data is confined and not transferred to main memory. However, cold-boot attacks that target cache memories exploit the data remanence. Thus, a sudden power shutdown may not delete data entirely, giving the opportunity to steal data. The biggest challenge for any technique aiming to secure the cache memory is performance penalty. Techniques based on data scrambling have demonstrated that security can be improved w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 16 publications
0
0
0
Order By: Relevance
“…• S5R3C2 -ISTe SPEMA countermeasure as proposed in Equation 4.9 [100] • S3M -same as S3 but with random masking RM-IST. No figure illustrates explicitly this configuration but consider Figure 4.13, where bits {.…”
Section: Resultsmentioning
confidence: 99%
“…• S5R3C2 -ISTe SPEMA countermeasure as proposed in Equation 4.9 [100] • S3M -same as S3 but with random masking RM-IST. No figure illustrates explicitly this configuration but consider Figure 4.13, where bits {.…”
Section: Resultsmentioning
confidence: 99%