Pankaj Rohatgi

>Pankaj Rohatgi

Exploiting side-channel attacks with ASLR cache vulnerabilities (AnC)

Researchers from Vrije University in the Netherlands have developed a side-channel attack that neatly bypasses address space layout randomization (ASLR). As the researchers explain, ASLR randomizes the location of an application’s code and data in [...]

Rambus inks security licensing agreement with Idaho Scientific

Rambus has signed an agreement with Idaho Scientific to license its Differential Power Analysis (DPA) countermeasures. According to Dr. Martin Scott, general manager of Rambus’s Security Division, the DPA countermeasures will be used in Idaho [...]

Evaluating security risks in the cloud

Cloud computing is perhaps best known for offering users ubiquitous and convenient on-demand network access. “[The cloud provides a] pool of configurable computing resources such as shared networks, servers, storage, applications, and services,” Ernest Worthman [...]

Breaking software-based White Box Cryptography (WBC)

Ernest Worthman of Semiconductor Engineering recently described White Box Cryptography (WBC) as a “novel approach” that implements cryptography algorithms in software, rather than hardware. “The idea is to keep the cryptographic assets secure against attacks, [...]

Evolving differential power analysis targets SIM cards

Ernest Worthman of Semiconductor Engineering recently noted that differential power analysis (DPA) has been a threat vector on the chip landscape for a number of years. “[DPA] was discovered around the mid 1990s by the [...]

Designing lightweight cryptography for the IoE

Ernest Worthman of Semiconductor Engineering recently noted that we have entered an age where technology is expected to do more, faster, anonymously, and often invisibly. “It’s supposed to use less power, with smaller footprints, unobtrusively [...]

Understanding the methodology behind side-channel attacks


Rambus Cryptography Research Fellow Pankaj Rohatgi recently penned an in-depth EDN article describing the methodology behind side-channel attacks. The technique, says Rohatgi, relies on the fact that any physical realization of cryptography in hardware or [...]

Medical devices probed for possible cyber flaws

The U.S. Department of Homeland Security is currently investigating a number of cases of suspected cybersecurity flaws in medical devices and hospital equipment. As Reuter’s reports, products under the spotlight include infusion pumps and implantable [...]