no code implementations • 4 Feb 2021 • Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun
The majority of smartphones either run iOS or Android operating systems.
Cryptography and Security
2 code implementations • 23 May 2020 • Ivan Puddu, Moritz Schneider, Miro Haller, Srdjan Čapkun
We show that the adversary can use the Frontal attack to extract a secret from an SGX enclave if that secret was used as a branching condition for two instruction-wise identical branches.
Cryptography and Security