A Toolkit for Micro-architectural Attacks on Mobile Devices (available)

Micro-architectural attacks leverage side-effects from modern processor features during the execution of secret-dependent code. These attacks have emerged in recent years as a potent vector for recovering cryptographic keys and other secret data. Despite this, very few implementations of published attacks have been released publicly on mobile devices, which has raised questions about their reproduciblity. … full description “A Toolkit for Micro-architectural Attacks on Mobile Devices (available)”

Combatting Fake News Using Mobile Trusted Execution Environments (available)

The distribution of fake news – hoaxes, propaganda, and outright false articles – by pseudo-news outlets is a major issue. Fake news can undermine trust in legitimate sources of news and the integrity of the democratic process. Existing methods to combat this issue have significant shortcomings. Manual take-downs are slow and lack scalability, particularly if … full description “Combatting Fake News Using Mobile Trusted Execution Environments (available)”

Micro-architectural Attacks on RISC-V Devices (available)

RISC-V is a royalty-free instruction set architecture (ISA) introduced in 2010 with substantial differences to ARM and X86-64 platforms. Its open-source nature threatens to disrupt the status quo of these widely deployed proprietary processor architectures. RISC-V devices have, very recently, started to reach the commercial marketplace. Future potential deployments of such RISC-V devices includes industrial … full description “Micro-architectural Attacks on RISC-V Devices (available)”