| 1 |
Spectre attacks: Exploiting speculative execution |
3924 |
2020 |
| 2 |
Power analysis attacks: Revealing the secrets of smart cards |
3378 |
2007 |
| 3 |
Meltdown: Reading kernel memory from user space |
3215 |
2020 |
| 4 |
Flush+ flush: A fast and stealthy cache attack |
963 |
2016 |
| 5 |
Cache template attacks: Automating attacks on inclusive Last-Level caches |
702 |
2015 |
| 6 |
DRAMA: Exploiting DRAM addressing for Cross-CPU attacks |
696 |
2016 |
| 7 |
ARMageddon: Cache attacks on mobile devices |
670 |
2016 |
| 8 |
Rowhammer. js: A remote software-induced fault attack in javascript |
649 |
2016 |
| 9 |
Malware guard extension: Using SGX to conceal cache attacks |
614 |
2017 |
| 10 |
Masked dual-rail pre-charge logic: DPA-resistance without routing constraints |
599 |
2005 |
| 11 |
Successfully attacking masked AES hardware implementations |
550 |
2005 |
| 12 |
Hardware countermeasures against DPAâa statistical analysis of their effectiveness |
478 |
2004 |
| 13 |
A side-channel analysis resistant description of the AES S-box |
463 |
2005 |
| 14 |
Side-channel leakage of masked CMOS gates |
454 |
2005 |
| 15 |
An AES smart card implementation resistant to power analysis attacks |
438 |
2006 |
| 16 |
Domain-oriented masking: Compact masked hardware implementations with arbitrary protection order |
404 |
2016 |
| 17 |
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR |
396 |
2016 |
| 18 |
Systematic classification of side-channel attacks: A case study for mobile devices |
393 |
2017 |
| 19 |
Kaslr is dead: long live kaslr |
368 |
2017 |
| 20 |
A simple power-analysis (SPA) attack on implementations of the AES key expansion |
362 |
2002 |
| 21 |
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization |
317 |
2019 |
| 22 |
One for allâall for one: unifying standard differential power analysis attacks |
304 |
2011 |
| 23 |
A highly regular and scalable AES hardware architecture |
299 |
2003 |
| 24 |
Single-trace side-channel attacks on masked lattice-based encryption |
268 |
2017 |
| 25 |
SIFA: exploiting ineffective fault inductions on symmetric cryptography |
267 |
2018 |
| 26 |
Practical second-order DPA attacks for masked smart card implementations of block ciphers |
266 |
2006 |
| 27 |
Hello from the other side: SSH over robust cache covert channels in the cloud |
243 |
2017 |
| 28 |
The world is not enough: Another look on second-order DPA |
232 |
2010 |
| 29 |
Fantastic timers and where to find them: High-resolution microarchitectural attacks in JavaScript |
214 |
2017 |
| 30 |
Template attacks on maskingâresistance is futile |
199 |
2007 |
| 31 |
An efficient side-channel protected AES implementation with arbitrary protection order |
192 |
2017 |
| 32 |
Evaluation of the masked logic style MDPL on a prototype chip |
189 |
2007 |
| 33 |
An IoT endpoint system-on-chip for secure and energy-efficient near-sensor analytics |
175 |
2017 |
| 34 |
Timber-v: Tag-isolated memory bringing fine-grained enclaves to risc-v |
173 |
2019 |
| 35 |
Donky: Domain KeysâEfficient In-Process Isolation for RISC-V and x86 |
163 |
2020 |
| 36 |
Pinpointing the side-channel leakage of masked AES hardware implementations |
159 |
2006 |
| 37 |
Formal verification of masked hardware implementations in the presence of glitches |
157 |
2018 |
| 38 |
Localized electromagnetic analysis of cryptographic implementations |
151 |
2012 |
| 39 |
Power analysis attacks and countermeasures |
140 |
2007 |
| 40 |
Clustering algorithms for non-profiled single-execution attacks on exponentiations |
130 |
2013 |
| 41 |
Statistical ineffective fault attacks on masked AES with fault countermeasures |
126 |
2018 |
| 42 |
Isap v2. 0 |
125 |
2020 |
| 43 |
Power and EM attacks on passive RFID devices |
120 |
2007 |
| 44 |
ISAPâtowards side-channel secure authenticated encryption |
116 |
2017 |
| 45 |
DATAâdifferential address trace analysis: Finding address-based Side-Channels in binaries |
115 |
2018 |
| 46 |
Protecting AES software implementations on 32-bit processors against power analysis |
112 |
2007 |
| 47 |
A new approach to DNS security (DNSSEC) |
108 |
2001 |
| 48 |
Efficient AES implementations on ASICs and FPGAs |
104 |
2004 |
| 49 |
Coco:Co-Design and Co-Verification of masked software implementations on CPUs |
100 |
2021 |
| 50 |
Cryptographic Hardware and Embedded Systems: CHES 2010 |
99 |
2010 |
| 51 |
Keydrown: Eliminating software-based keystroke timing side-channel attacks |
98 |
2018 |
| 52 |
Practical memory deduplication attacks in sandboxed Javascript |
97 |
2015 |
| 53 |
Practical keystroke timing attacks in sandboxed javascript |
95 |
2017 |
| 54 |
Jenny: Securing syscalls for PKU-based memory isolation systems |
92 |
2022 |
| 55 |
Rolling colors: Adversarial laser exploits against traffic light recognition |
90 |
2022 |
| 56 |
Reconciling masking in hardware and software |
86 |
2017 |
| 57 |
Automated detection, exploitation, and elimination of double-fetch bugs using modern cpu features |
74 |
2018 |
| 58 |
HECTOR-V: A heterogeneous CPU architecture for a secure RISC-V execution environment |
73 |
2021 |
| 59 |
Higher-order side-channel protected implementations of KECCAK |
73 |
2017 |
| 60 |
Sponge-based control-flow protection for IoT devices |
73 |
2018 |
| 61 |
Secure and efficient masking of AES-a mission impossible? |
72 |
2004 |
| 62 |
Exploiting data-usage statistics for website fingerprinting attacks on Android |
66 |
2016 |
| 63 |
A unified masking approach |
64 |
2018 |
| 64 |
Towards fresh and hybrid re-keying schemes with beyond birthday security |
63 |
2015 |
| 65 |
Susceptibility of eSTREAM candidates towards side channel analysis |
61 |
2008 |
| 66 |
Spectre attacks: Exploiting speculative execution. ArXiv e-prints (Jan |
60 |
2018 |
| 67 |
Procharvester: Fully automated analysis of procfs side-channel leaks on android |
55 |
2018 |
| 68 |
Collide+ Power: Leaking inaccessible data with software-based power side channels |
53 |
2023 |
| 69 |
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis |
53 |
2014 |
| 70 |
Protecting the control flow of embedded processors against fault attacks |
52 |
2015 |
| 71 |
Generating a session key for authentication and secure data transfer |
50 |
2014 |
| 72 |
Scandroid: Automated side-channel analysis of android apis |
47 |
2018 |
| 73 |
Transparent memory encryption and authentication |
45 |
2017 |
| 74 |
Exploiting radiated emissions-EM attacks on cryptographic ICs |
44 |
2003 |
| 75 |
Malware Guard Extension: abusing Intel SGX to conceal cache attacks |
42 |
2020 |
| 76 |
Dependable Internet of Things for Networked Cars |
41 |
2017 |
| 77 |
Fault attacks on nonce-based authenticated encryption: Application to keyak and ketje |
41 |
2018 |
| 78 |
Implementation aspects of the DPA-resistant logic style MDPL |
40 |
2006 |
| 79 |
A Masked AES ASIC Implementation |
39 |
2004 |
| 80 |
Cryptag: Thwarting physical and logical memory vulnerabilities using cryptographically colored memory |
39 |
2021 |
| 81 |
Side channel analysis resistant design flow |
39 |
2006 |
| 82 |
MEAS: memory encryption and authentication secure against side-channel attacks |
38 |
2019 |
| 83 |
On the security of fresh re-keying to counteract side-channel and fault attacks |
36 |
2014 |
| 84 |
Concealing secrets in embedded processors designs |
34 |
2016 |
| 85 |
Enhancing side-channel analysis of binary-field multiplication with bit reliability |
34 |
2016 |
| 86 |
Protecting risc-v processors against physical attacks |
34 |
2019 |
| 87 |
Scatter and split securely: Defeating cache contention and occupancy attacks |
32 |
2023 |
| 88 |
A novel CMOS logic style with data independent power consumption |
30 |
2005 |
| 89 |
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel |
30 |
2024 |
| 90 |
Securing implementations of block ciphers against side-channel attacks |
29 |
2005 |
| 91 |
Dope: Domain protection enforcement with pks |
28 |
2023 |
| 92 |
Riding the waves towards generic single-cycle masking in hardware |
28 |
2022 |
| 93 |
Exploiting the physical disparity: Side-channel attacks on memory encryption |
27 |
2016 |
| 94 |
First-order masking with only two random bits |
27 |
2019 |
| 95 |
Secure and efficient software masking on superscalar pipelined processors |
26 |
2021 |
| 96 |
Exploiting the difference of side-channel leakages |
24 |
2012 |
| 97 |
Multi-tag: A hardware-software co-design for memory safety based on multi-granular memory tagging |
24 |
2023 |
| 98 |
SYNFI: pre-silicon fault analysis of an open-source secure element |
24 |
2022 |
| 99 |
i Popp T |
23 |
2007 |
| 100 |
Formal verification of arithmetic masking in hardware and software |
21 |
2023 |
| 101 |
Arithmetic logic units with high error detection rates to counteract fault attacks |
20 |
2011 |
| 102 |
Distributed compiling process with instruction signature support |
20 |
2014 |
| 103 |
Ec-cfi: Control-flow integrity via code encryption counteracting fault attacks |
18 |
2023 |
| 104 |
FIPAC: Thwarting fault-and software-induced control-flow attacks with arm pointer authentication |
18 |
2022 |
| 105 |
KernelSnitch: side-channel attacks on kernel data structures |
18 |
2025 |
| 106 |
Securing conditional branches in the presence of fault attacks |
18 |
2018 |
| 107 |
Fault-resistant partitioning of secure cpus for system co-verification against faults |
17 |
2024 |
| 108 |
On the duality of probing and fault attacks |
17 |
2010 |
| 109 |
Power contracts: Provably complete power leakage models for processors |
17 |
2022 |
| 110 |
Practical attacks on masked hardware |
17 |
2009 |
| 111 |
Protecting indirect branches against fault attacks using ARM pointer authentication |
17 |
2021 |
| 112 |
Servas! secure enclaves via risc-v authenticryption shield |
16 |
2021 |
| 113 |
Compress: Generate small and fast masked pipelined circuits |
14 |
2024 |
| 114 |
On the relationship between correlation power analysis and the stochastic approach: an ASIC designer perspective |
14 |
2013 |
| 115 |
Power-related side-channel attacks using the Android sensor framework |
14 |
2025 |
| 116 |
Program-instruction-controlled instruction flow supervision |
14 |
2019 |
| 117 |
Beyond the edges of kernel control-flow hijacking protection with hek-cfi |
13 |
2024 |
| 118 |
Instruction encryption/decryption arrangement and method with iterative encryption/decryption key update |
13 |
2014 |
| 119 |
Pointing in the right direction-securing memory accesses in a faulty world |
13 |
2018 |
| 120 |
Smooth passage with the guards: Second-order hardware masking of the AES with low randomness and low latency |
13 |
2024 |
| 121 |
Spear-v: Secure and practical enclave architecture for risc-v |
13 |
2023 |
| 122 |
Leakage bounds for gaussian side channels |
12 |
2017 |
| 123 |
Masked nonlinear feedback shift register |
12 |
2015 |
| 124 |
Power analysis attacks: revealing the secrets of smart cards |
12 |
2007 |
| 125 |
Cryptographically enforced memory safety |
11 |
2023 |
| 126 |
Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels |
10 |
2024 |
| 127 |
HashTag: Hash-based Integrity Protection for Tagged Architectures |
10 |
2023 |
| 128 |
Investigations of power analysis attacks and countermeasures for ARIA |
10 |
2006 |
| 129 |
Memory tagging using cryptographic integrity on commodity x86 cpus |
10 |
2024 |
| 130 |
Side-channel plaintext-recovery attacks on leakage-resilient encryption |
10 |
2017 |
| 131 |
Smart Card Research and Advanced Applications: 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers |
10 |
2013 |
| 132 |
Secwalk: Protecting page table walks against fault attacks |
9 |
2021 |
| 133 |
Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC |
9 |
2024 |
| 134 |
Compress: Reducing Area and Latency of Masked Pipelined Circuits |
8 |
2023 |
| 135 |
Memes: Memory encryption-based memory safety on commodity hardware |
8 |
2023 |
| 136 |
SCRAMBLE-CFI: mitigating fault-induced control-flow attacks on OpenTitan |
8 |
2023 |
| 137 |
Sharing independence & relabeling: Efficient formal verification of higher-order masking |
8 |
2018 |
| 138 |
TME-box: scalable in-process isolation through intel TME-MK memory encryption |
8 |
2024 |
| 139 |
High speed ASIC implementations of leakage-resilient cryptography |
7 |
2018 |
| 140 |
Keydrown: eliminating keystroke timing side-channel attacks |
7 |
2017 |
| 141 |
Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS |
7 |
2017 |
| 142 |
Submission to NIST |
7 |
2019 |
| 143 |
Calculation and simulation of the susceptibility of cryptographic devices to power-analysis attacks |
6 |
2018 |
| 144 |
Randomized memory access |
6 |
2018 |
| 145 |
Exact Soft Analytical Side-Channel Attacks using Tractable Circuits |
5 |
2024 |
| 146 |
Method and apparatus for data processing |
5 |
2015 |
| 147 |
Quantile: Quantifying information leakage |
5 |
2024 |
| 148 |
SCFI: State machine control-flow hardening against fault attacks |
5 |
2023 |
| 149 |
Statistical characteristics of power traces |
5 |
2007 |
| 150 |
When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-AmplifiedTLBSide-Channel Leaks |
5 |
2025 |
| 151 |
All for one-one for all: Unifying univariate DPA attacks |
4 |
2011 |
| 152 |
Counteracting power analysis attacks by masking |
4 |
2009 |
| 153 |
Securing memory encryption and authentication against side-channel attacks using unprotected primitives |
4 |
2017 |
| 154 |
Security aspects of masking on FPGAs |
4 |
2024 |
| 155 |
Signature update by code transformation |
4 |
2016 |
| 156 |
The Doom of Device Drivers: Your Android Device (Most Likely) has N-Day Kernel Vulnerabilities |
4 |
2025 |
| 157 |
Towards leakage simulators that withstand the correlation distinguisher |
4 |
2014 |
| 158 |
TVLA on selected NIST LWC finalists |
4 |
2022 |
| 159 |
Cache Template Attacks |
3 |
2022 |
| 160 |
Detection of Intrusions and Malware, and Vulnerability Assessment |
3 |
2016 |
| 161 |
Die physikalische Sicherheit eingebetteter Systeme |
3 |
2012 |
| 162 |
KASLR is Dead: Long Live KASLR |
3 |
2017 |
| 163 |
Secure Context Switching of Masked Software Implementations |
3 |
2023 |
| 164 |
SFP: Providing System Call Flow Protection against Software and Fault Attacks |
3 |
2022 |
| 165 |
Apparatus and method for detecting integrity violation |
2 |
2019 |
| 166 |
ChoiceJacking: Compromising Mobile Devices through Malicious Chargers like a Decade ago |
2 |
2025 |
| 167 |
Cryptographic Least Privilege Enforcement for Scalable Memory Isolation |
2 |
2025 |
| 168 |
Keeping Secrets on Low-Cost Chips |
2 |
2013 |
| 169 |
On loopy belief propagation for sascas: An analysis and empirical study of the inference problem |
2 |
2025 |
| 170 |
Secure Implementation of Cryptographic Algorithms |
2 |
2012 |
| 171 |
Simple Power Analysis |
2 |
2007 |
| 172 |
Small faults grow up-verification of error masking robustness in arithmetically encoded programs |
2 |
2019 |
| 173 |
Smart card research and advanced applications |
2 |
2012 |
| 174 |
Tutorial T1: Designing Secure SoCs |
2 |
2007 |