Abstract—In this paper we analyze three methods to detect cache-based side-channel attacks in real time, preventing or limiting the amount of leaked information. Two of the three methods are based on machine learning techniques and all the three of them can successfully detect an attacker in about one fifth of the time required to complete the attack. There were no false positives in our test environment. Moreover we could not measure a change in the execution time of the processes involved in the attack, meaning there is no perceivable over-head. We also analyze how the detection systems behave with a modified version of one of the spy processes. With some optimization we are confident these systems can be used in real world scenarios. 1
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
International audienceCache Side Channel Attacks (SCAs) have gained a lot of attention in the recent...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
In this paper we analyze three methods to detect cache-based side-channel attacks in real time, prev...
With the increasing complexity of cryptographic algorithms, attackers are looking for side channels ...
International audienceWe present a novel run-time detection approach for cache-based side channel at...
International audienceThis paper presents experimental evaluation and comparative analysis on the us...
In this work, we first present a low-cost, anomaly-based semi-supervised approach, which is instrume...
International audienceIntel's x86 architecture has been exposed to high resolution and stealthy cach...
International audienceCache Side Channel Attacks (SCAs) have gained a lot of attention in the recent...
Detecting and suppressing malicious attacks continues to challenge designers and users of embedded a...
International audienceTiming-based side-channels play an important role in exposing the state of a p...
Over the last decades the digitalization has become an integral part of daily life. Computer systems...
Today, nearly all modern devices, including smartphones, PCs, and cloud servers, benefit significant...