4.3 Article

Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble

期刊

IEEE SECURITY & PRIVACY
卷 18, 期 5, 页码 28-37

出版社

IEEE COMPUTER SOC
DOI: 10.1109/MSEC.2020.2990495

关键词

Circuit faults; Program processors; Clocks; Security; Central Processing Unit; Reactive power

资金

  1. Research Fund KU Leuven
  2. Agency for Innovation and Entrepreneurship (Flanders)
  3. Engineering and Physical Sciences Research Council (EPSRC) [EP/R012598/1, EP/R008000/1]
  4. European Union [779391, 681402]
  5. Research Foundation Flanders
  6. EPSRC [EP/R012598/1, EP/R008000/1] Funding Source: UKRI

向作者/读者索取更多资源

Historically, fault injection was the realm of adversaries with physical access. This changed when research revealed that remote attackers could use software to inject faults. Plundervolt is a new software-based attack on Intel's trusted execution technology (SGX). Plundervolt can break cryptography and inject memory-safety bugs into secure code.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.3
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据