Cryptography: what is under the mask?
In a world where increasingly sensitive tasks take place online, cryptography is becoming a critical discipline. Whether it is dating, private banking, or filing taxes, people want reassurance that their data is safe and secure.
Look at side-channel attacks, which hit global prominence in 2018 with the discovery of the Meltdown and Spectre vulnerabilities. Spectre and Meltdown were the world’s introduction to side-channels. Through these, nefarious elements were able to use by-products of the processor’s behavior, such as electro-magnetic radiation or microarchitectural timing, to locate, reconstruct, and steal secret data.
Over the last couple of years, a team at Sorbonne Université in Paris, France has been using Arm’s Cortex-M3 processor source code to model what is really happening in the hardware at the micro-architectural level. They also look to verify how secure existing silicon really is in the face of side-channel vulnerabilities.
Here, the team share how the project came about; how micro-architectural leakage modeling works; and how they hope it helps make the world more secure…
To read the full article, click here
Related Semiconductor IP
- UCIe Chiplet PHY & Controller
- MIPI D-PHY1.2 CSI/DSI TX and RX
- Low-Power ISP
- eMMC/SD/SDIO Combo IP
- DP/eDP
Related Blogs
- What Is the OSI Model, and How Can We Protect Its Critical Layers?
- Doubling Bandwidth in Under Two Years: PCI Express Base Specification Revision 5.0, Version 0.9 is Now Available to Members
- What is the latency of TICO technology?
- What is SweRV Core EH2?
Latest Blogs
- Cadence Unveils the Industry’s First eUSB2V2 IP Solutions
- Half of the Compute Shipped to Top Hyperscalers in 2025 will be Arm-based
- Industry's First Verification IP for Display Port Automotive Extensions (DP AE)
- IMG DXT GPU: A Game-Changer for Gaming Smartphones
- Rivos and Canonical partner to deliver scalable RISC-V solutions in Data Centers and enable an enterprise-grade Ubuntu experience across Rivos platforms