
REFERENCES
Almeida, J. B., Barbosa, M., Barthe, G., Dupressoir, F., and
Emmi, M. (2016). Verifying {Constant-Time} im-
plementations. In 25th USENIX Security Symposium
(USENIX Security 16).
Bernstein, D. J. (2005). Cache-timing attacks on AES.
Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M.,
and Palermo, G. (2005). AES power attack based on
induced cache miss and countermeasure. volume 1.
Bogdanov, A. (2007). Improved side-channel collision at-
tacks on AES. In International Workshop on Selected
Areas in Cryptography.
Bogdanov, A. and Kizhvatov, I. (2011). Beyond the limits of
DPA: combined side-channel collision attacks. IEEE
Transactions on Computers, 61(8).
Brasser, F., M
¨
uller, U., Dmitrienko, A., Kostiainen, K.,
Capkun, S., and Sadeghi, A.-R. (2017). Software
grand exposure: SGX cache attacks are practical. In
USENIX Workshop on Offensive Technologies.
Brier, E., Clavier, C., and Olivier, F. (2004). Correlation
power analysis with a leakage model. In International
workshop on cryptographic hardware and embedded
systems.
Clavier, C. (2004). Side channel analysis for reverse engi-
neering (SCARE), an improved attack against a secret
A3/A8 GSM algorithm.
Cristiani, V., Lecomte, M., and Hiscock, T. (2019). A bit-
level approach to side channel based disassembling.
In Conference on Smart Card Research and Advanced
Applications.
Dey, M., Nazari, A., Zajic, A., and Prvulovic, M. (2018).
Emprof: Memory profiling via em-emanation in
iot and hand-held devices. In 2018 51st Annual
IEEE/ACM International Symposium on Microarchi-
tecture (MICRO).
Fanjas, C., Gaine, C., Aboulkassimi, D., Ponti
´
e, S., and
Potin, O. (2022). Combined fault injection and real-
time side-channel analysis for android secure-boot by-
passing. In International Conference on Smart Card
Research and Advanced Applications.
Fournier, J. and Tunstall, M. (2006). Cache based power
analysis attacks on AES. In Australasian Conference
on Information Security and Privacy.
Gallais, J.-F., Kizhvatov, I., and Tunstall, M. (2010). Im-
proved trace-driven cache-collision attacks against
embedded aes implementations. In International
Workshop on Information Security Applications.
Ge, Q., Yarom, Y., Cock, D., and Heiser, G. (2018). A
survey of microarchitectural timing attacks and coun-
termeasures on contemporary hardware. Journal of
Cryptographic Engineering.
G
´
erard, B. and Standaert, F.-X. (2013). Unified and opti-
mized linear collision attacks and their application in
a non-profiled setting: extended version. Journal of
Cryptographic Engineering, 3(1).
Goldack, M. and Paar, I. C. (2008). Side-channel based re-
verse engineering for microcontrollers. Master’s the-
sis, Ruhr-Universit
¨
at Bochum, Germany.
G
¨
otzfried, J., Eckert, M., Schinzel, S., and M
¨
uller, T.
(2017). Cache attacks on Intel SGX. In Proceedings
of the 10th European Workshop on Systems Security.
Gruss, D., Spreitzer, R., and Mangard, S. (2015). Cache
template attacks: Automating attacks on inclusive
last-level caches. In 24th USENIX Security Sympo-
sium.
Kocher, P., Jaffe, J., and Jun, B. (1999). Differential power
analysis. In Annual International Cryptology Confer-
ence.
Lipp, M., Gruss, D., Spreitzer, R., Maurice, C., and Man-
gard, S. (2016). ARMageddon: Cache attacks on mo-
bile devices. In 25th USENIX Security Symposium.
Lisovets, O., Knichel, D., Moos, T., and Moradi, A. (2021).
Let’s take it offline: Boosting brute-force attacks on
iphone’s user authentication through sca. IACR Trans-
actions on Cryptographic Hardware and Embedded
Systems.
Liu, F., Yarom, Y., Ge, Q., Heiser, G., and Lee, R. B. (2015).
Last-level cache side-channel attacks are practical. In
2015 IEEE symposium on security and privacy.
Longo, J., Mulder, E. D., Page, D., and Tunstall, M. (2015).
Soc it to em: electromagnetic side-channel attacks on
a complex system-on-chip. In International Workshop
on Cryptographic Hardware and Embedded Systems.
LTD, A. (2012). Cortex-a9 technical reference manual. Re-
vision: r4p1.
Maillard, J., Hiscock, T., Lecomte, M., and Clavier, C.
(2023). Side-channel disassembly on a system-on-
chip: A practical feasibility study. Microprocessors
and Microsystems, 101.
Mangard, S., Oswald, E., and Popp, T. (2008). Power anal-
ysis attacks: Revealing the secrets of smart cards.
Springer.
Novak, R. (2003). Side-channel based reverse engineer-
ing of secret algorithms. In Proceedings of the Elec-
trotechnical and Computer Science Conference.
Osvik, D. A., Shamir, A., and Tromer, E. (2006). Cache at-
tacks and countermeasures: the case of AES. In Cryp-
tographers’ track at the RSA conference.
Pinto, S. and Santos, N. (2019). Demystifying arm trust-
zone: A comprehensive survey. ACM computing sur-
veys (CSUR), 51(6).
Schramm, K., Leander, G., Felke, P., and Paar, C. (2003a).
A collision-attack on AES combining side channel
and differential-attack. Submitted for Publication.
Schramm, K., Wollinger, T., and Paar, C. (2003b). A new
class of collision attacks and its application to DES. In
International Workshop on Fast Software Encryption.
Spreitzer, R. and Plos, T. (2013). Cache-access pattern at-
tack on disaligned AES T-tables. In Workshop on
Constructive Side-Channel Analysis and Secure De-
sign.
Yarom, Y. and Falkner, K. (2014). FLUSH+RELOAD: A
high resolution, low noise, l3 cache side-channel at-
tack. In 23rd USENIX security symposium.
Yarom, Y., Genkin, D., and Heninger, N. (2017).
Cachebleed: a timing attack on openssl constant-time
rsa. Journal of Cryptographic Engineering.
Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM Accesses
273