Welcome to the Secure Heterogeneous Architecture and Cryptography Implementations Research Group, where we explore the critical intersection of cryptographic techniques and hardware security. Our multidisciplinary team delves into a wide array of topics, including advanced cryptographic protocols, secure system architectures, and the protection of heterogeneous systems against emerging threats. By combining theoretical insights with practical applications, we aim to enhance the resilience of digital infrastructures, safeguard sensitive information, and contribute to the development of innovative security solutions. Join us as we tackle the challenges of securing hardware and ensuring robust cryptographic practices in an increasingly interconnected world.
Fault attack is a form of practical attack where the adversary deliberately perturbs an ongoing computation with some external stimuli to corrupt it, and eventually obtain something unwanted out of this corrupted computation.
Side channel attacks exploit information leaked through the physical implementation of a system, rather than through vulnerabilities in the software or protocols. These attacks can gather data from sources like timing information, power consumption, or electromagnetic emissions to extract sensitive information, such as cryptographic keys.
Micro-architectural attacks are one of the most extensively researched areas in computer security. Finding the attacks has been the most prominent research direction so far.