Covert channels through shared processor resources provide secret communication between malicious processes. In this paper, we introduce a new mechanism for covert communica-tion using the processor branch prediction unit. Specifically, we demonstrate how a trojan and a spy can manipulate the branch prediction tables in a way that creates high-capacity, robust and noise-resilient covert channel. We demonstrate this covert channel on a real hardware platform both in Simultaneous Multi-Threading (SMT) and single-threaded settings. We also discuss techniques for improving the chan-nel quality and outline possible defenses to protect against this covert channel. 1
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Network covert channels have become a sophisticated means for transferring hidden information over t...
This paper explores the potential of executables for covert communication. Three techniques for the ...
This paper presents a new software side-channel attack --- enabled by the branch prediction capabil...
Abstract. This paper announces a new software side-channel attack — enabled by the branch prediction...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
The improvement in performance gained by the use of multi-core processors led to security problem. I...
Abstract. Asymmetric-key cryptographic algorithms when implemented on systems with branch predictors...
Modern processors use branch prediction as an optimization to improve processor performance. Predict...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Covert timing channels have been considered a significant threat in multi-level systems (MLS) becaus...
Modern processors use branch prediction as an optimization to improve processor performance. Predict...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Network covert channels have become a sophisticated means for transferring hidden information over t...
This paper explores the potential of executables for covert communication. Three techniques for the ...
This paper presents a new software side-channel attack --- enabled by the branch prediction capabil...
Abstract. This paper announces a new software side-channel attack — enabled by the branch prediction...
Abstract—Microarchitectural resources such as caches and predictors can be used to leak information ...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
The improvement in performance gained by the use of multi-core processors led to security problem. I...
Abstract. Asymmetric-key cryptographic algorithms when implemented on systems with branch predictors...
Modern processors use branch prediction as an optimization to improve processor performance. Predict...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
Covert timing channels have been considered a significant threat in multi-level systems (MLS) becaus...
Modern processors use branch prediction as an optimization to improve processor performance. Predict...
Covert channels are a fundamental concept for cryptanalytic side-channel attacks. Covert timing chan...
Network covert channels have become a sophisticated means for transferring hidden information over t...
This paper explores the potential of executables for covert communication. Three techniques for the ...